Archives for April, 2011.

Assessments

By admin | Published April 23rd, 2011

network-security-auditing-small2

Security assessments are critical in validating that your current security controls are effective and working as expecting. Organizations should periodically verify their applications and security controls using a thorough and sound assessment methodology to ensure attackers cannot compromise their information or systems. Firewalls, mail filters, exchange servers, critical servers, web application server, and Virtual Private Network (VPN) gateways are a few systems that organizations should consider.

K2E Security provides high quality and detailed assessments in:

  • Vulnerability assessments to confirm software patching, secure configurations, and unwanted services are not running.
  • Penetration testing to find security holes in your perimter defences.
  • Threat risk assessments to address business risks and threats that may impact an organization.
  • Privacy impact assessments to ensure your sensitive information is protected.
  • Web application testing to determine weaknesses in input sanitization that lead to attacks such as cross-site scripting (XSS).
  • Database testing to validate your backend databases are not vulnerable to SQL injections and other database attacks.

Roadmap

By admin | Published April 19th, 2011

We excel at building new or improving existing security programs through a detailed roadmap. Our team of experts drive security vision and best practices into solid programs that addresses your business problems and renders security a business enabler. The security program follows a proven architecture and a layered defence approach which covers four quadrants: endpoints, network, applications, and validation. Our cohesive teams work collaboratively with you to build the right security program for your environment as every organization is unique.

 

 

Awareness

By admin | Published April 18th, 2011

Educating your users through a comprehensive security awareness program will drastically reduce threats to your information and network. This program can host online security awareness training, build newsletters, and posters to ensure security is everyone’s responsibility. An effective security awareness program is priceless. Organizations can activate and deploy small modules periodically, which does not overwhelm employees and keeps them focused on the current module.

The training modules can use mini-quizzes at the end to recap the material and ensure employees understand the basic principles. You can have the best security controls in place but an employee lacking security awareness may inadvertently circumvent or render these controls irrelevant depending on their actions and behaviours.

Twitter Weekly Updates for 2011-04-10

By admin | Published April 10th, 2011
  • What kind of advice is this!! Craig Spiezle’s advice for businesses? “If you are collecting data, you have to assume you will lose it,” #
  • Epsilon data breach – affected customer list grows http://tinyurl.com/3u3zod7 #

Powered by Twitter Tools