[vc_row layout=”wide” margintop=”0″ marginbottom=”0″ paddingtop=”150″ paddingbottom=”150″ border_width=”0″ border_color=”#e8e8e8″ bg_image=”213″ bg_attachment=”scroll” bg_repeat=”repeat” bg_stretch=”true” bg_parallax=”true” video_bg=”false” video_quality=”default” vid_opacity=”70″ video_overlay_opac=”70″][vc_column width=”1/1″][vc_row_inner][vc_column_inner width=”1/1″][vc_column_text]

Security Analysis

[/vc_column_text][vc_column_text]

Serious About Securing Your Data

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row layout=”wide” margintop=”0″ marginbottom=”0″ paddingtop=”30″ paddingbottom=”30″ bg_color=”#ffffff” border_width=”1″ border_color=”#e8e8e8″ bg_attachment=”scroll” bg_repeat=”repeat” bg_stretch=”false” bg_parallax=”false” video_bg=”false” video_quality=”default” vid_opacity=”70″ video_overlay_opac=”70″][vc_column width=”1/1″][vc_row_inner][vc_column_inner width=”1/6″]

[vc_single_image image=”14″ alignment=”center” img_link_target=”_self” img_size=”full”][/vc_column_inner][vc_column_inner width=”1/6″][vc_single_image image=”13″ alignment=”center” img_link_target=”_self” img_size=”full”][/vc_column_inner][vc_column_inner width=”1/6″][vc_single_image image=”16″ alignment=”center” img_link_target=”_self” img_size=”full”][/vc_column_inner][vc_column_inner width=”1/6″]

[vc_single_image image=”17″ alignment=”center” img_link_target=”_self” img_size=”full”][/vc_column_inner][vc_column_inner width=”1/6″][vc_single_image image=”18″ alignment=”center” img_link_target=”_self” img_size=”72×79″][/vc_column_inner][vc_column_inner width=”1/6″]

[vc_single_image image=”19″ alignment=”center” img_link_target=”_self” img_size=”full”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row layout=”wide” margintop=”0″ marginbottom=”0″ paddingtop=”50″ paddingbottom=”40″ border_width=”1″ border_color=”#e8e8e8″ bg_attachment=”scroll” bg_repeat=”repeat” bg_stretch=”false” bg_parallax=”false” video_bg=”false” video_quality=”default” vid_opacity=”70″ video_overlay_opac=”70″ bg_color=”#f7f7f7″][vc_column width=”1/1″][vc_row_inner][vc_column_inner width=”1/1″][vc_column_text]
SERIOUS SECURITY SERVICES
[/vc_column_text]

[vc_column_text]Within SA there are various level of penetration studies we can accomplish. We look at both internal and external attack vectors and incorporate real-world threat analysis. By incorporating items such as social engineering and physical threat assessment we provide clients with the technical knowledge they need for security prevention programs.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row layout=”normal” margintop=”0″ marginbottom=”0″ paddingtop=”75″ paddingbottom=”50″ border_width=”0″ border_color=”#e8e8e8″ bg_attachment=”scroll” bg_repeat=”repeat” bg_stretch=”false” bg_parallax=”false” video_bg=”false” video_quality=”default” vid_opacity=”70″ video_overlay_opac=”70″][vc_column width=”2/3″][vc_single_image image=”216″ img_link_target=”_self” css_animation=”appear” img_size=”full”][/vc_column][vc_column width=”1/3″][vc_column_text]

Internal/External Attack Vectors

[/vc_column_text]

[vc_column_text]There is little doubt that there are bad people out there. Identifying where they can attack from is one of the first lines for a critical defense plan. External attack vectors are very common in that they are the great mass. Individually unidentifiable and yet still defendable. Knowing who to block and whom to allow is the important balance IT operations must strike.

Identifying what can be accessed from the inside will facilitate the manager’s design of a system with a “defense in depth” posture. The goal of any defensive system is to limit the areas a rouge employee or consultant can gain access to.[/vc_column_text]


[/vc_column][/vc_row][vc_row layout=”normal” margintop=”0″ marginbottom=”0″ paddingtop=”50″ paddingbottom=”50″ border_width=”0″ border_color=”#e8e8e8″ bg_attachment=”scroll” bg_repeat=”repeat” bg_stretch=”false” bg_parallax=”false” video_bg=”false” video_quality=”default” vid_opacity=”70″ video_overlay_opac=”70″][vc_column width=”1/3″][vc_column_text]

Physical Threat Assessment

[/vc_column_text]

[vc_column_text]Physical threats includes the identification of locations where breaches can physically be executed. Leaving the Communication Room door unlocked is an obvious invitation to a physical breach. How about Post-it Notes on monitors with the users’ passwords. We have all seen it and some of you may still have them tucked under the corner of the desk blotter… Right?? 😉

Part of our program is to complete physical assessment of potential risks. By identifying how the breach can occur and removing the vulnerably is the goal of physical threat assessments.[/vc_column_text]


[/vc_column][vc_column width=”2/3″][vc_single_image image=”134″ alignment=”right” img_link_target=”_self” img_size=”full” css_animation=”appear”][/vc_column][/vc_row][vc_row layout=”normal” margintop=”0″ marginbottom=”0″ paddingtop=”50″ paddingbottom=”75″ border_width=”0″ border_color=”#e8e8e8″ bg_attachment=”scroll” bg_repeat=”repeat” bg_stretch=”false” bg_parallax=”false” video_bg=”false” video_quality=”default” vid_opacity=”70″ video_overlay_opac=”70″][vc_column width=”2/3″][vc_single_image image=”137″ img_link_target=”_self” css_animation=”appear” img_size=”full”][/vc_column][vc_column width=”1/3″][vc_column_text]

Security Prevention Programs

[/vc_column_text]

[vc_column_text]Great! You gone to all this trouble to complete reviews of internal and external threat vectors. You completed physically securing your environment and have implemented the greatest security policy you can. However you forgot to include a prevention program. So one of your employees finds a mysterious USB memory stick in the parking lot. Sticks it in their work computer to see what is on it and BAM! your entire network has been compromised.

“An ounce of prevention is worth a pound of cure.”

With our Prevention Program we can help educate employees and consultants working with you. This program can prevent the loss before it even happens.

[/vc_column_text]

[/vc_column][/vc_row]
Copyright 2018 Dark Arts Consulting | All Rights Reserved.