Evaluate Your Technology and Test Your Defenses
Reviewing network configurations and assessing security practices has to be an ongoing process. M.A. Polce offers a variety of options to help you identify threats, uncover vulnerabilities, test your defenses, and guide you toward compliance. We have been doing assessment and compliance work with public and private organizations for over 20 years. We understand NIST CSF, CIS, and other industry-recognized frameworks from which to evaluate your technology and security deployment.
Lower the risk of cyber-attacks by identifying the vulnerabilities that could allow threats to infiltrate. We’ll run automated scans, review network configurations, and provide a comprehensive report that allows you to take corrective action to firm up your defenses. M.A. Polce’s Security Assessment is one of the best first steps an organization can take.
Identify, prioritize, and measure your organization’s cybersecurity risk to proactively mitigate threats. Risk assessments provide insight to ensure your organization is taking the right steps to protect assets, satisfy compliance, and effectively manage risk.
After security assessments and vulnerability scans have been completed and the identified risks have been remediated, it is recommended that a penetration test be conducted. The “pen” test is performed by one of our certified security professionals and will determine if hackers can infiltrate your network’s defenses to gain access to sensitive systems. Penetration testing can be done from outside the network (external), inside the network (internal), and with lateral movement once a system has been exploited.
Tabletop Readiness Exercise
Conduct a dry run through various security scenarios to test your preparedness in the event of a cyber-attack, breach, or other event where technology systems are disrupted. One of our team members will facilitate an onsite planning session with selected staff members from your organization. Administrators, technical staff, and others will benefit from participating to strategize how the organization will respond if faced with real security events.
Best Pratices Assessment
Our Best Practices Assessments (BPA) evaluate your system configurations, looking at the specific aspects of your IT environment that you’d like to assess. Our engineers can look at server topologies, active directory, server and network architecture, network configurations, and other important aspects of your infrastructure. We can also check to see if your policies adhere to industry standards. We then provide recommendations for how to remediate any issues that are found.
NIST CSF Gap Analysis
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is the recognized industry leader for technology and security standards. Our NIST Gap Analysis measures your security posture against the NIST CSF framework to provide a detailed overview of strengths and areas of need. The results will equip your team with the knowledge necessary to move you toward compliance.
Virtual Chief Information Security Officer
Our Virtual Chief Information Security Officer (vCISO) is a remotely managed service that connects you with one of our certified security experts to help guide your cybersecurity efforts. The vCISO helps avoid costly overhead and allows you to customize a program to address the areas in which you need to most assistance.
Policy & Procedure Consulting
M.A. Polce’s consulting practice has been assisting organizations with governance and IT compliance for decades. After understanding your business requirements, we’ll update or create policies by leveraging our comprehensive set of policies that we’ve created and honed over many years.
As a business owner, you need the right technology to keep your business running efficiently and secure from data breaches. When looking to outsource these
The Situation The January 30, 2021 ransomware attack on the Victor Central School District located near Rochester, New York, was an unwelcome reminder of the