Review the security of your entire network, including all devices, user accounts, applications, and system data and the following attack path models:

  • Credential Stealing
  • Malware
  • Network attack
  • Ransomware
  • Social Engineering
  • Web application vulnerabilities

A full security audit with KnowIT covers the following areas:

  • Inventory and Control of Hardware Assets
  • Inventory and Control of Software Assets
  • Continuous Vulnerability Management
  • Controlled Use of Administrative Privileges
  • Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
  • Maintenance, Monitoring, and Analysis of Audit Logs
  • Email and Web Browser Protections
  • Malware Defenses
  • Limitation and Control of Network Ports, Protocols, and Services
  • Data Recover Capabilities
  • Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
  • Boundary Defense
  • Data Protection
  • Controlled Access Based on the Need to Know
  • Wireless Access Control
  • Account Monitoring and Control
  • Implement a Security Awareness and Training Program
  • Application Software Security
  • Incident Response and Management
  • Penetration Tests and Red Team Exercises

Audits are completed in two components: the technology assessment and risk assessment.

The first monthly engagement will cover defining the scope and criteria of the audit, conducting interviews with team members, and reviewing the current status to produce a report on the state of your company’s IT and our current overall recommendations.

During the second month of the audit, our team will complete vulnerability scanning and finalize a risk analysis report summary to guide future remediation efforts.


Alleviate your compliance concerns by contacting KnowIT today!