Network Security Assessment
The Link Network Security Assessment is a sophisticated yet
affordable on-site analysis to determine your network's vulnerability
to hackers, viruses and other security threats. This comprehensive
- External and internal security probe analysis
- A list of any discovered security vulnerabilities, risks and implications
- Recommended technical solutions outlining specific software, tools and implementation steps needed to secure your network
- Executive summary of findings for management
Penetration Testing and Vulnerability Assessment
Link Computer Corporations assessments and audits help organizations enhance data security and privacy, safeguard information, comply with regulatory concerns, and reduce legal liability.
Penetration assessments evaluate the security of a computer system or network by simulating an attack from a malicious user (hacker). Penetration assessments are ideal for:
- Ensuring compliance (PCI, HIPAA, Sarbanes Oxley, etc.)
- Emerging and fast growing firms
- Organizations concerned about security
- Businesses with geographically distributed offices
- Organizations in the financial and health care industries
- Firms working with the government or large institutions
- Organizations that share and collect personal and/or proprietary data
Assessment Work Plan
Our services include an active analysis of your system for any potential vulnerabilities that result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses.
In an attempt to breach security, our services simulate various types of attacks on your organization's network and employees. Our analysis is carried out from the position of a potential attacker but does not involve active exploitation of security vulnerabilities.
Our services include a combination of automated and manual methods to determine and exploit vulnerabilities:
Penetration Testing (Ethical Hacking)
Our ethical hacking penetration testing service helps evaluate intruder threats. We neither damage your systems nor steal information. Instead, we evaluate the target systems' security and report back to you any vulnerabilities and instructions on how to close the holes.
Ethical hacking demands a lot of time and persistence, sometimes monitoring systems for days or weeks waiting for an opportunity.
A typical evaluation requires several days of tedious work that is difficult to automate. In many instances, portions of the evaluations are done outside of normal working hours to avoid interfering with production and simulating the timing of a real attack.
We spend the time to learn about your systems and try to find its weaknesses. This also requires continuous education and review in this ever changing world of computer and network security.
We review and analyze physical access to systems, un-shredded documents, and can use digital dumpster diving and other techniques to gain access to confidential information.
Our experts test your staff and their security related education. We check for human error that can lead to disclosure of proprietary information through personal e-mails, losing or forgetting passwords, and vulnerability to con-artists and "social engineering" techniques.
Our deliverables include a report of our findings as well as recommendations, and a prioritized Action Plan.