Consolidated Risk Report

Your risk report will consist of a security report and scorecard that points out areas of risk or potential points of failure in your environment, a remediation action plan and a summary of the assets discovered on the network. The output provides:

✓  Overview of the health and security of the network

✓  Separate risk scores for Network, Security, Exchange, SQL Server and Compliance (HIPAA and PCI) assessments

✓  Summary of individual issues with severity and risk analysis

✓ Scorecard identifying risks and potential points of failure

✓ Summary of assets discovered on the network

✓ Remediation action plan

Click here for a sample report.

Risk analysis and risk management are not one-time activities. They are dynamic processes that must be periodically reviewed and updated in response to changes in the environment. The risk analysis will identify new risks or update existing risk levels resulting from environmental or operational changes. To get started or ask questions email us, fill out form or chat below. 

Network Issue Summary:

User password set to never expire
Issue: User accounts with passwords set to never expire present a risk of use by unauthorized users. They are more easily compromised than passwords that are routinely changed.
Recommendation: Investigate all accounts with passwords set to never expire and configure them to expire regularly.

Inactive computers
Issue: Computers have not checked in during the past 30 days
Recommendation: Investigate the list of inactive computers and determine if they should be removed from Active Directory, rejoined to the network, logged into by authorized users, or powered on.

Anti-spyware not up to date
Issue: Up to date anti-spyware definitions are required to properly prevent the spread of malicious software. Some anti-spyware definitions were found to not be up to date.
Recommendation: Ensure anti-spyware definitions are up to date on specified computers.

Insecure listening ports
Issue: Computers are using potentially insecure protocols.
Recommendation: There may be a legitimate business need, but these risks should be assessed individually. Certain protocols are inherently insecure since they often lack encryption. Inside the network, their use should be minimized as much as possible to prevent the spread of malicious software. Of course, there can be reasons these services are needed and other means to protect systems which listen on those ports. We recommend reviewing the programs listening on the network to ensure their necessity and security. See Listening Ports sheets in Excel Export for details.

User has not logged on to domain in 30 days
Issue: Users have not logged on to domain in 30 days. A user that has not logged in for an extended period of time could be a former employee or vendor.
Recommendation: Disable or remove user accounts for users that have not logged on to active directory in 30 days.

Lack of redundant domain controller
Issue: Only one domain controller was found on the network. There is a heightened risk of business downtime, loss of data, or service outage due to a lack of redundancy.
Recommendation: Evaluate the risk, cost, and benefits of implementing a redundant Domain Controller.

Operating system in Extended Support
Issue: Computers are using an operating system that is in Extended Supported. Extended Support is a warning period before an operating system is no longer supported by the manufacturer and will no longer receive support or patches.
Recommendation: Upgrade computers that have operating systems in Extended Support before end of life.

Un-populated organization units
Issue: Empty organizational units (OU) were found in Active Directory. They may not be needed and can lead to misconfiguration.
Recommendation: Remove or populate empty organizational units.

Compromised Passwords found on the Dark Web
Issue: A scan of the Dark Web revealed one or more compromised passwords from your domain. The most recent compromise occurred in 2020.
Recommendation: Ensure the compromised passwords are no longer in use. We recommend having all users reset their password as the extent of the compromise is difficult to assess.

Password complexity not enabled
Issue: Enforcing password complexity limits the ability of an attacker to acquire a password through brute force.
Recommendation: Enable password complexity to assure that network user account passwords are secure.

Automatic screen lock not turned on
Issue: Automatic screen lock prevents unauthorized access when users leave their computers. Having no screen lock enabled allows unauthorized access to network resources.
Recommendation: Enable automatic screen lock on the specified computers.

Account lockout disabled
Issue: Account lockout (disabling an account after a number of failed attempts) significantly reduces the risk of an attacker acquiring a password through a brute force attack.
Recommendation: Enable account lockout for all users.

Inconsistent password policy / Exceptions to password policy
Issue: Password policies are not consistently applied from one computer to the next. A consistently applied password policy ensures adherence to password best practices.
Recommendation: Eliminate inconsistencies and exceptions to the password policy.

Asset summary including aging workstations & servers, available storage, internal & external vulnerabilities, etc. will follow.  Ready to get started?  Click here, fill out form below or chat in the lower right.

Speak with an
IT Professional Today!

Please fill out this form and we'll get right back to you.

First Name
Last Name
How did you hear about us?
How can we help?