Flex Protection Logo

Streamlined Cybersecurity education, planning, assessment, monitoring, and testing

Security Assessment

Free Information Security Self-Assessment

How prepared are you? For a limited time, you can take advantage of a free online self-assessment tool here. Quickly determine just how much risk you are facing with your current operations and procedures.

It takes about 5 minutes and we will provide an immediate score and opportunity for follow-up.

Do ANY of these apply to you?

  • We need to have a brief “discovery” conversation to identify options.
  • We could use help developing or reviewing a formal data security policy.
  • We could use a detailed plan for threat assessments and active security testing.
  • We are looking for scanning and testing to identify possible exposures.
  • We need to get our arms around the most critical risks and how to reduce them.
  • We want to reduce risks by providing Best Practices education for our end users.
  • We want to know what modern tools and systems are available for protecting our data.
Security assessment rules should be agreed on in advance.

Basic Data Security Check-Up

Low-cost review and guidance:

  • Review and suggest improvements to your Data Security Policy.
  • Review/develop your Security Testing Plan.
  • Perform vulnerability scans of your network and/or web applications.
  • Provide tips for "hardening" your devices, applications, and data storage.
  • Provide an online "Security Awareness" course highlighting end-user best practices.
  • Identify additional steps to improve overall security without disrupting operations.

A security assessment can point to needed changes.

Security Assessment Principles

  • System and data attack tactics should be similar to those used by actual hackers who have malicious intent.
  • All passive and active research steps, and all attempted attacks sould be performed only with permission from the client.
  • All penetration testing work will be done to the highest ethical standards, with no external agenda or purpose.
  • The privacy of all users, managers, and staff will be respected and no collected data or passwords will be published or distributed elsewhere.
  • Every effort is made to minimize or eliminate impact on current operations during the security testing.
  • Permission to access users, computers, data, and networks must be granted before any assessment work is begun.

Security assessment rules should be agreed on in advance.

Flex Protection Logo

Copyright 2021 National Training Systems 16586 N Dale Mabry Hwy. Tampa FL 33618  --  Training provided by FlexTraining