The world of cyber threats evolves every day, as new discoveries are made both by would-be attackers and security researchers alike. Let cyber security professionals like Irwin Technical Services assess the cyber security readiness of your business and ensure that you are adequately protected from cyber threats.
Our Cyber Security Evaluations (CSEs) have several phases. A brief outline of each phase is described below:
Planning
In the planning phase, stakeholders are briefed and the scope of the evaluation is established. We customize the standard plan for a CSE for the client, taking into account any specific points of concern.
General Data Collection
We collect publicly available information about your organization. This information could include public records, satellite imagery, data from publicly available databases, and many more sources. In this phase we want to understand what kind of information an attacker could gain before a more targeted attack.
Targeted Data Collection
We collect targeted data as prescribed by the planning phase. This may include in-person visits to your site, active probes of your websites and network, and attempts to identify any vulnerabilities which could be of use to a would be attacker.
Compilation / Analysis
We meticulously compile and analyze all data collected, in an effort to prioritize all known risks to your organization. We identify the most effective methods of protection and necessary steps to ensure your site's defense.
Presentation / Follow Up
You are briefed on the results of the evaluation and provided with follow-up options.
Not sure if a comprehensive Cyber Security Evaluation is right for you? Contact us for more information!