San Antonio (210) 305-4087

With today’s IT environment, it is more important than ever to ensure your network is secure and that you perform routine IT Security Assessments. Despite the size of your network, all companies must realize they are a target for hackers and viruses. Actually, more small networks are hacked than large enterprise networks. This is typically due to bad IT practices and lower security awareness. Allowing your network to be hacked or to be affected by ransomware can be crippling for your business.

ICS believes every small and medium sized company should at least understand where their network is vulnerable. Therefore, ICS provides Free IT Security Assessments to our customers. At absolutely no charge to the client, ICS will execute our software on your site and remotely to ensure we detect any internal or external threats. ICS will even come to your site for a face to face meeting to not only run the software but to review the results at your convenience. From there, your results may be used to work with your existing IT department or you may elect to hire ICS to assist with resolving any outstanding issues.

With our Free IT Security Assessment you will also receive a copy of our IT Network Assessment at no additional charge. This report will provide you with a better understanding of what hardware, software and design you have in your network. See the below two charts to determine the difference between the IT Security Assessment and IT Network Assessment.

To schedule your Free IT Security Assessment simply fill out our Contact Us form and an ICS representative will reach out to you for scheduling.

What is included in IT Security Assessment? (Free)

TaskDescription
Detect System Protocol LeakageDetects outbound protocols that should not be allowed
Detect Unrestricted ProtocolsDetects system controls for protocols that should be allowed but restricted.
Detect User ControlsDetects if controls are in place for user webs browsing.
Detect Wireless AccessDetects and determines if wireless networks are available and secured.
External Security VulnerabilitiesPerforms detailed External Vulnerability Scan. List and Categorize external security Threats
Network Share permissionsDocuments access to file system shares.
Domain Security PolicyDocument domain computer and domain controller security policies
Local Security PolicyDocuments and assesses consistency of local security policies.

What is Included in Network Security Assessment? (Free)

TaskDescription
Detect Domain ControllersIdentifies domain controllers and online status.
FSMO Role AnalysisEnumerates FSMO roles at the site
Enumerate Organization Units and Security GroupsLists the organizational units and security groups (with members)
User AnalysisList the users in AD, status, and last login/use, which helps identify potential security risks.
Detect Local Mail ServersDetects mail server(s) on the network.
Detect Time ServersDetect server(s) on the network.
Discover Networks SharesDiscover the network shares by server.
Detect Major ApplicationsDetects all major apps / versions and counts the number of installations.
Detailed Domain Controller Event Log AnalysisList the event log entries from the past 24 hours for the directory service, DNS server and file replication service event logs.
SQL Server AnalysisList the SQL Servers and associated database(s).
Internet Domain AnalysisQueries company domain(s) via a WHOIS lookup.
Password Strength AnalysisUses MBSA to identify computers with weak password that may pose a security risk.
Missing Security UpdatesUses MBSA to identify computers missing security updates.
System by System Event Log AnalysisDiscovers the five system and app event log errors for servers..
External Security VulnerabilitiesLists the security holtes and warning from External Vulnerability Scan.

Contact ICS