Vulnerability Scanning
Why do a Vulnerability Scan?
Vulnerability scanning is critical to properly securing your organization. Do you know what is on your network? Are your systems patched? How do you verify that the patching was successful? We can help you answer these questions with a vulnerability scan.
How scanning works
Our vulnerability scan examines your network to find all connected computers, printers, and communication equipment. Vulnerable items on the network are then identified so you can prioritize more secure options immediately.
Vulnerability Testing Process
Sign Up
2 - Testing
- Test Analyst run testing tools
- Manual tests are performed as necessary
- Test Data is compiled
1 - Process Start
- Sign NDA
- Review Process
- Create Test Plan
- Install Hardware/Software
- Establish Test Time-frame
3 - Reporting
- Meet w/ Cubed Corps & discuss findings
- Feedback / Q&A
- Discuss future engagement
Scan Intervals
Scans are only good for a short period of time, but they are integral to a fully secured network. We recommend scanning your systems a minimum of once per year. Quarterly scans are even better. We also offer continuous monitoring if your business needs extra security.
Reporting
Our analysts compile information from the vulnerability scan to provide you with relevant details. This report contains a high-level breakdown that highlights risks and strengths in your network security. We also include cybersecurity recommendations to help business leaders make informed decisions.
The report breaks down each vulnerability in detail, including the testing process and remediation steps. This makes it simpler for the IT team to make decisions on how to fix vulnerabilities. We go to great lengths to ensure each report is both explicit and easy to navigate.
Remediation Testing
Upon client request, CubedCorps will review an assessment after a vulnerability is patched. We will ensure each security remediation was implemented properly, and the risk eliminated. A new assessment will be created that reflects the more secure state of your network.