Managed Services | Security Consulting |
Vulnerability Assessments | Back-Up Solutions | Networking | Outsourced IT Support
Vulnerability Assessments and Audits
Cebic’s Vulnerability Analysis provides a starting point for the strategic planning process by identifying “open door” security risks and other threats to your system. We also identify issues that are causing system and network problems.
Staff interviews provide a more complete picture of your overall computer systems issues, including deficiencies with computers, printers, or the network specific to individual workstations. Cebic also queries personal habits, such as password settings and computer handling to ensure that you receive a complete assessment report for your operation.
The process analysis determines current IT policies and implementation. From this, written recommendations are provided to the client company to strengthen computer security and operations. Executive summaries are provided with all our reports along with technical backup documentation of the performed security scans
The IT Business Plan is based on your overall business goals, allowing you to maximize return on your IT infrastructure by implementing only technologies that help you reach your business goal. The Business Continuation Plan provides a roadmap for your staff to use in the event of a disaster, expediting the return to normal business operations.
Follow-up audits are preformed on a regular 3 - 6 or 12 month schedule to ensure that all Security and IT issues are addressed and that you are aware of any new issues.
Full scale security audits for industries required by law to comply with a variety of rules and regulations are conducted by our experience security auditors. Audits can vary greatly in cost and timeframe due to the specific requirements each industry has to adhere to. Please contact us for more information in regards to your auditing requirements. We are happy to have our auditors discuss your next project with you.