IT Infrastructure Health Assessment (IIHA)

9 Out of 10 Computer Networks Have Potentially SERIOUS IT Problems Sitting UNDETECTED!

Is your own network at risk?

As a leader in our industry, we would be glad to sit with your team and provide an holistic health assessment (Health Check) of your computer network and digital business resources.

We will analyze your ICT Infrastructure to uncover vulnerabilities that could lead to a far-reaching Service Disruption/Interruption for your Organization.

Depending on the outcomes, we will equally provide a remedial course of action to prevent unauthorized access, fortify the security systems, sensitive data lock down, become more mobile and, in general, get more out of your existing technology infrastructure.   Below is a sampled possibility based on the past jobs:

Hardware: Servers, Workstations, Printers, and non-AD devices (like switches/routers/printers). Retired computers which are still joined to the domain and have not been removed.
Software: Systems with missing Patches/Service Packs/Security Updates. Local accounts (per-system) with weak/insecure passwords. Systems with missing Anti-Virus, Anti-Spyware, or firewall misconfiguration.
Configuration: Security policy inconsistency across network servers/computers. Outbound system access that should be blocked. Lack of Content filtering (Social Media, Entertainment, Pornography, Illegal Downloads).
Accessibility: Misconfiguration of user access to Network Shares. Detailed breakdown of AD Security Group Membership.
Security Risks: Old user accounts which still have access and have not been properly disabled. Internal systems with open ports that pose a potential security risk. External issues which put your network at risk of business disruption or data loss.

The Deliverable:

Our Client Risk Report is usually less than 10 page report, in form of an executive summary that provides an overview of the devices on the network along with a network Risk Score and analysis of each potential issue we have uncovered.  We will review this document with you, discuss the findings, in detail, and answer any questions you may have.

 

SiteLock