Our answer to the penetration test; discover how safe your network is.
buttressIT : Stealth Network AuditSurprise security audits are necessary in cases where you suspect there are active local hackers. You may suspect that an employee has launched an attack from your network, or you suspect that a business partner will engage in covering-up evidence of hacking. Perhaps you just want to find out if your security teams are wearing their game face. In all these cases, your best option is a surprise audit.
A surprise audit is one where the auditor comes to your network blind. You give them access to your organization's LAN and WiFi, just like you would with any new employee. The auditor's job is to access public resources to check your network and systems for obvious signs of hacking. Auditors can more easily track rogue computers when their operators are unaware that they are being tracked. When this type of audit is performed successfully, even your IT will be unaware that there has been an audit.
Once the auditor has collected the most obvious evidence of hacking, it may be appropriate to continue the audit as a standard audit with the cooperation of your IT people. This more extensive audit would do a full inventory of your computing infrastructure and its security.
If any rogue computers were identified in the surprise audit, your IT people can help with tracking down the rogue computer and hacker. This surprise audit with is one of the best ways to rid your organization of hackers.
Contact Intrepid Net Computing for a customized audit plan. We do not peform penetration testing during our audits.
buttressIT ExamplesCybersecurity in Salt Lake - Nov. 30, 2016
Cybersecurity in Boise - Sept. 9, 2016
Cybersecurity in Miami - Jul. 7, 2016
Cybersecurity in Montana - Jun. 25, 2016