GEN Security Auditing

Even the most basic connectivity implementation can have holes in it, from switching/routing firmware flaws to inadvertently enabled VPN protocols or badly configured firewall rules and that's what Network Security Auditing is all about, an impartial double check of the security measures you've already implemented. During the audit we will attempt direct and indirect exploitation of your systems to reveal any possible issues with the network fabric, then we'll turn to what is by far the largest risk to security, the staff. Giving staff access to ONLY what they require to do their job has been the default position on network security since the 70's but its so often the case in smaller companies that staff have access to way more than they need, sometimes even administrative privileges! Below is a very simple overview of the audit process: 

  • Analyse network security from the public internet - check for vulnerabilities and exploits. 
  • Analyse network security from the LAN (or WAN) - check for vulnerabilities, exploits, and sample the data stream for unknown or suspicious packets. 
  • Analyse the LAN for RAT (Remote Access Tools) that have been willingly or unknowingly installed and have open connections to the internet. 
  • Run a full security scan of storage and fabrics. Ensure that corporate data is secured in such a way that would make its compromise very hard. 
  • Analyse user permissions, reach and effect. Look at password strengths, two factor authentication, and of course post-it notes with passwords on them stuck to the front of PC's. 
  • Analyse cloud based services for security and resilience. 
  • Analyse anti-virus and IDS systems for effectiveness. 
  • Analyse Wifi Networks, connectivity and compromises. 
  • Analyse laptops, tablets, and other remote solutions which may or may not have an impact on network security. 
  • Analyse Staffing risks, single point of failures, and high risk individuals. 

And then we write a full and detailed report of our findings with recommendations at each stage. Once all the issues have been resolved we'll re-audit again to confirm. Security Auditing is priced sensibly on a day rate basis, and one day is often sufficient for small businesses with one connection. Larger organisations may take several days or more but we will be able to provide an estimation prior to commencing any work.

If you think your business would benefit from a Security Audit then contact us today for more information! 

Cyber Exchange Member Badge FullGEN has been accepted as a member of the UK's Government Backed Cyber Exchange

The Cyber Exchange is a fantastic place to find Security Companies, Resources and News relating to Cyber Security within the UK. GEN has for many years been providing highly responsive cyber, network and email security solutions and services. Our Antispam and Antivirus gateways protect your organisation from email based threats and our Internet Gateways likewise protect your organisation from internet based threats. We offer some of the highest security encrypted connections as well as encrypted telephony and premises security. 

 

73761520

Social Media is a wash with hysteria and false information that is starting to effect people in negative ways. At GEN we need to be ahead of the curve on this so we can actively manage our operations and ensure continuity. We will share t

...

 

 

We've spent many years working with many different OEM's and integrators designing and developing embedded systems for everything from household appliances to military communication satellites.

Our developers work in C, C++, C# o

...

New York State lawmakers unanimously passed legislation (A10500C/S8450C) to protect New Yorkers cooperating with contact tracing efforts from having their data used against them in court proceedings or administrative hearings. Once

We are HP Partners and as such can supply the full range of Hewlett Package hardware and software. We are specialists in HP Netservers from generation 2 awards. We can offer outsourced supply and support for the full range of HP DL/ML and B

...