IT Vulnerability Assessment
Hacking is on the rise. Ransomware is everywhere. You cannot afford to lose your business because of a default password or forgetting to patch a desktop.
Threat and Vulnerability Assessments – Threats come from multiple sources: the insider employee or the outsider agents via the Internet. All software and hardware have inherent vulnerabilities. OCD Tech can test your security posture and provide you with the information needed to make appropriate decisions to mitigate risk and decrease exposure to these threats.
During our assessments, we review, at a minimum, the following areas:
- Network scan to identify suspect devices
- Anti-Virus/Malware coverage
- Software firewall configuration
- Windows program installation
- Password policies (default passwords)
- Application/Security event logging configuration and retention
- Windows desktop local administrator group membership
- Application/Security event logging configuration and retention
- Security patch levels for the operating system and web browser
- Still using Wireless WEP? Or worse, no encryption at all?
- Backup technologies are stored appropriately and any confidential data is encrypted

