Vulnerability Assessment

It is critical to assess the risks within your organization's IT infrastructure. Despite an organization's best efforts, IT systems are often released with bugs and installed with misconfigurations, or the underlying technology is changing so rapidly that it's hard for system administrators to keep pace. Schneider Downs understands that the process for installing security updates can be confusing and time-consuming, and that, in reality, security updates can sometimes be overlooked.

The goal of the Vulnerability Assessment is to provide our clients with a comprehensive view of potential security flaws in their environment by looking for misconfigurations, unpatched services, open ports and other architectural mistakes. The results of this assessment will be a detailed report of vulnerabilities uncovered during the assessment, ranked by criticality, along with an agreed-upon remediation plan with detailed steps to assist in remediating noted vulnerabilities that create a security risk.

Detailed Approach to a Vulnerability Assessment

We begin by identifying the scope of the assessment through mapping the client's IP address ranges. This approach will help identify the active devices on the organization's network. From here, a port scan will be performed on each of the active devices identified. This will determine which services are running on each active device and the associated ports. From the device discovery, we will scan each IP address with our automated security assessment tools to identify misconfigurations, vacant patches, and service vulnerabilities that may exist within the host. We will then analyze the results to eliminate any false positives that may have been identified and determine the actual threat and risk to the organization.

Our Vulnerability Assessment works in conjunction with our automated tools and the application of our industry experience. We determine the impact of potential security exposures and the risk they may or may not pose depending on your organization's overall security posture and risk appetite.

Regardless of your organization's size, Schneider Downs will work with you to determine the most effective approach when determining the scope of the assessment. Our team will work closely with you to analyze the results and take a collaborative approach in issue identification and building action plans to remediate identified vulnerabilities. We also consider any other security components and mitigating factors to determine the overall risk to the security posture of the organization's IT infrastructure. We believe that it is essential to take this holistic strategic view during a vulnerability assessment to accurately identify the risk to the organization.

The results of our assessment will be a detailed report of vulnerabilities uncovered during the assessment, ranked by criticality, along with an agreed-upon remediation plan with detailed steps to assist in remediating the noted vulnerabilities.

case studies

 
big problem:
A not-for-profit client out of 401(k) compliance.
big thinking:
Allowing more contributions by highly paid employees.
 
big problem:
Hackers attempting a six-figure wire transfer.
big thinking:
Rapid action spearheaded active containment and response.

our thoughts on

When to Buy New Electronics? Now!

Every day we use products bearing the label “Made in China”, a mark that has become synonymous with the affordable mass production of countless

read more >

Bill S. 1564 Calls for Delay of CECL Implementation Until a Quantitative Economic Impact Study is Completed

The Financial Accounting Standards Board (FASB) issued a new expected credit loss accounting standard in June 2016. This new standard introduces the current

read more >

Artificial Intelligence in Higher Education

Before you finish typing a key word in the search bar, it may appear as if your thoughts have been predicted. Artificial intelligence (AI) and machine

read more >

Why Higher Education Institutions Must Comply with GDPR

The EU General Data Protection Regulation (GDPR) has been in effect for 10 months. One sector that has been affected by the newly enforced regulation,

read more >

Minimizing Higher Ed Risks - Utilizing Internal Audit and Data Analytics

We’ve all seen various colleges and universities in the news lately, and the news was not always positive. Higher education institutions face a varied

read more >

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

contactsd@schneiderdowns.com
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

contactsd@schneiderdowns.com
p:614.621.4060     f:614.621.4062