Your Information Is Safe With Us. ICS will never sell, rent, share or distribute your personal details with anyone. In addition, we will never spam you.
With today’s IT environment, it is more important than ever to ensure your network is secure and that you perform routine IT Security Assessments. Despite the size of your network, all companies must realize they are a target for hackers and viruses. Actually, more small networks are hacked than large enterprise networks. This is typically due to bad IT practices and lower security awareness. Allowing your network to be hacked or to be affected by ransomware can be crippling for your business.
ICS believes every small and medium sized company should at least understand where their network is vulnerable. Therefore, ICS provides Free IT Security Assessments to our customers. At absolutely no charge to the client, ICS will execute our software on your site and remotely to ensure we detect any internal or external threats. ICS will even come to your site for a face to face meeting to not only run the software but to review the results at your convenience. From there, your results may be used to work with your existing IT department or you may elect to hire ICS to assist with resolving any outstanding issues.
With our Free IT Security Assessment you will also receive a copy of our IT Network Assessment at no additional charge. This report will provide you with a better understanding of what hardware, software and design you have in your network. See the below two charts to determine the difference between the IT Security Assessment and IT Network Assessment.
To schedule your Free IT Security Assessment simply fill out our Contact Us form and an ICS representative will reach out to you for scheduling.
|Detect System Protocol Leakage||Detects outbound protocols that should not be allowed|
|Detect Unrestricted Protocols||Detects system controls for protocols that should be allowed but restricted.|
|Detect User Controls||Detects if controls are in place for user webs browsing.|
|Detect Wireless Access||Detects and determines if wireless networks are available and secured.|
|External Security Vulnerabilities||Performs detailed External Vulnerability Scan. List and Categorize external security Threats|
|Network Share permissions||Documents access to file system shares.|
|Domain Security Policy||Document domain computer and domain controller security policies|
|Local Security Policy||Documents and assesses consistency of local security policies.|
|Detect Domain Controllers||Identifies domain controllers and online status.|
|FSMO Role Analysis||Enumerates FSMO roles at the site|
|Enumerate Organization Units and Security Groups||Lists the organizational units and security groups (with members)|
|User Analysis||List the users in AD, status, and last login/use, which helps identify potential security risks.|
|Detect Local Mail Servers||Detects mail server(s) on the network.|
|Detect Time Servers||Detect server(s) on the network.|
|Discover Networks Shares||Discover the network shares by server.|
|Detect Major Applications||Detects all major apps / versions and counts the number of installations.|
|Detailed Domain Controller Event Log Analysis||List the event log entries from the past 24 hours for the directory service, DNS server and file replication service event logs.|
|SQL Server Analysis||List the SQL Servers and associated database(s).|
|Internet Domain Analysis||Queries company domain(s) via a WHOIS lookup.|
|Password Strength Analysis||Uses MBSA to identify computers with weak password that may pose a security risk.|
|Missing Security Updates||Uses MBSA to identify computers missing security updates.|
|System by System Event Log Analysis||Discovers the five system and app event log errors for servers..|
|External Security Vulnerabilities||Lists the security holtes and warning from External Vulnerability Scan.|