ICS specializes in managed IT services, business phones, video conferencing and more.
Book an initial consultation with ICS using the form below.
Your Information Is Safe With Us. ICS will never sell, rent, share or distribute your personal details with anyone. In addition, we will never spam you.
Free IT Security Assessment
With today’s IT environment, it is more important than ever to ensure your network is secure and that you perform routine IT Security Assessments. Despite the size of your network, all companies must realize they are a target for hackers and viruses. Actually, more small networks are hacked than large enterprise networks. This is typically due to bad IT practices and lower security awareness. Allowing your network to be hacked or to be affected by ransomware can be crippling for your business.
ICS believes every small and medium sized company should at least understand where their network is vulnerable. Therefore, ICS provides Free IT Security Assessments to our customers. At absolutely no charge to the client, ICS will execute our software on your site and remotely to ensure we detect any internal or external threats. ICS will even come to your site for a face to face meeting to not only run the software but to review the results at your convenience. From there, your results may be used to work with your existing IT department or you may elect to hire ICS to assist with resolving any outstanding issues.
With our Free IT Security Assessment you will also receive a copy of our IT Network Assessment at no additional charge. This report will provide you with a better understanding of what hardware, software and design you have in your network. See the below two charts to determine the difference between the IT Security Assessment and IT Network Assessment.
To schedule your Free IT Security Assessment simply fill out our Contact Us form and an ICS representative will reach out to you for scheduling.
What is included in IT Security Assessment? (Free)
Detect System Protocol Leakage
Detects outbound protocols that should not be allowed
Detect Unrestricted Protocols
Detects system controls for protocols that should be allowed but restricted.
Detect User Controls
Detects if controls are in place for user webs browsing.
Detect Wireless Access
Detects and determines if wireless networks are available and secured.
External Security Vulnerabilities
Performs detailed External Vulnerability Scan. List and Categorize external security Threats
Network Share permissions
Documents access to file system shares.
Domain Security Policy
Document domain computer and domain controller security policies
Local Security Policy
Documents and assesses consistency of local security policies.
What is Included in Network Security Assessment? (Free)
Detect Domain Controllers
Identifies domain controllers and online status.
FSMO Role Analysis
Enumerates FSMO roles at the site
Enumerate Organization Units and Security Groups
Lists the organizational units and security groups (with members)
List the users in AD, status, and last login/use, which helps identify potential security risks.
Detect Local Mail Servers
Detects mail server(s) on the network.
Detect Time Servers
Detect server(s) on the network.
Discover Networks Shares
Discover the network shares by server.
Detect Major Applications
Detects all major apps / versions and counts the number of installations.
Detailed Domain Controller Event Log Analysis
List the event log entries from the past 24 hours for the directory service, DNS server and file replication service event logs.
SQL Server Analysis
List the SQL Servers and associated database(s).
Internet Domain Analysis
Queries company domain(s) via a WHOIS lookup.
Password Strength Analysis
Uses MBSA to identify computers with weak password that may pose a security risk.
Missing Security Updates
Uses MBSA to identify computers missing security updates.
System by System Event Log Analysis
Discovers the five system and app event log errors for servers..
External Security Vulnerabilities
Lists the security holtes and warning from External Vulnerability Scan.