Cybersecurity Assessment
Cybersecurity has become the number one concern with technology. Organized groups and individuals are non stop trying to steal from your organization. Ignoring it will not make it go away. Navigating the multitude of options available to protect your organization can be daunting. The options are complex and confusing.
Our Methodology
Not having sufficient protection in place can be devastating. Even if you believe you are protected, a third party assessment can confirm it. Assessments and audits have been commonplace for areas of risk. Cybersecurity is a big area of risk.
L6 Technology’s cybersecurity assessment is geared towards smaller organizations.
Our goal is to help our customers confirm they have the basic measures in place to protect their organizations.
One of the biggest challenges with cybersecurity is understanding there is more than one area of technology to protect. To secure your home you need to lock the front door, back door, windows, and maybe add an alarm. If you leave the back door open it does not matter that the front door was locked. Having a good firewall is similar to having your front door locked. Confirming you are not able to get past the firewall only confirms the front door was locked.
A majority of all cybersecurity attacks do not come through the front door. Users clicking on things, opening something suspicious, and triggering an attack is the most common way a breach starts. To reduce the chance of this happening multiple areas of the technology need to be secured.
L6 Technology’s cybersecurity assessment focuses on the primary six areas to confirm your organization has the base protections in place for cybersecurity threats. The assessment will validate the areas that are protected and identify areas that are not secure. The report will also include recommendations on how to remediate any identified risks.
The following areas are covered in the L6 Technology cybersecurity assessment.
Perimeter
Perimeter
The perimeter of your locations is where inside private data crosses to the internet. Additional locations will often use the internet to connect inside private data together. A firewall should be protecting the perimeter of every location connected to the internet
Datacenter
Datacenter
Datacenter is where the servers, applications, cloud integrations, and shared data reside. This is also where user authentication takes place. Data backups and other important functionality happens here.
Endpoints
Endpoints
User workstations are where a majority of cybersecurity attacks start. Users opening a bad email, clicking on a suspicious link, all starts here. Endpoint protection is a very important piece in cybersecurity protection..
Policies
Policies
Policies and procedures should be defined. Password strategy, employee usage agreements, HR policies, and specific cybersecurity planning.
Physical
Physical
Access to the systems needs to be secured. Area’s with IT equipment need to be locked with authorized user access only.
Network
Network
The network consists of equipment that connects user devices together to access the technology. Networks normally provide wired and wireless connectivity. Securing and limiting networks based on who is using them is important for reducing risk.