GerBear Services
Home
Packages
The Hacker News
Canadian Online Quality
Contact Us
FAQ
Blog
GerBear Services
Home
Packages
The Hacker News
Canadian Online Quality
Contact Us
FAQ
Blog
More
  • Home
  • Packages
  • The Hacker News
  • Canadian Online Quality
  • Contact Us
  • FAQ
  • Blog
  • Home
  • Packages
  • The Hacker News
  • Canadian Online Quality
  • Contact Us
  • FAQ
  • Blog

Security Audit and Assessment

Security Audit and Assessment Service   $350.00 – $500.00 - $750.00

Includes a 6-month check in


Service Description:

  • Audit and Forensics 
  • Identify overall scope
  • Network mapping of all components, systems, devices, and network protocols
  • Outdated firmware and applications (patched versus unpatched)
  • Analyze network traffic logs to identify any suspicious activity
  • Network Penetration testing
  • Router placement 
  • Access to components, systems, devices, and network protocols (open ports)
  • Browser security testing for safe surfing
  • Vulnerability scans
  • Intrusion detection (Device Review on Network)
  • Email data breach (resources to Check URL’s authenticity)
  • Vulnerability ranking (Common Vulnerability Scoring System Version 4.0 Calculator (first.org))

                                    Low  0.1 - 3.9  High 7.0 - 8.9

                              Medium 4.0 - 6.9   Critical 9.0 - 10.0

  • Firewall configuration 
  • Pod extenders (with Internet provider/3rd Party)
  • Mesh Wifi systems (Orbi/Eero)
  • Supplemental routers (NetGear/Cisco)
  • Implement security best practices
  • Password management (Dashlane/Norton 360)
  • Strong & Unique Passwords
  • Network segmentation (SUBNET MASKING)
  • Privacy protection – blocking online trackers
  • PRIVATE Browsing applications 
  • Wifi Encrytion
  • Network monitoring for suspicious activity (smartphone app depending on Provider)
  • Intrusion protection systems 
  • Parental controls
  • Secure VPN

Output and Deliverable

  • Finding report and recommendations
  • Develop a complete remediation plan
  • Evaluate device usage and value of importance on your network
  • Backup and Recovery options


Security Audit and Assessment


To assess your network's security score (and/or vulnerability level), we would perform a network security audit which involves identifying potential vulnerabilities, in verifying all devices connected, review traffic logs and assessing the overall security of your network. This may involve running network scanning tools, reviewing firewall logs, and checking for any security patches or firmware updates that need to be applied.

Performing a network security audit involves several steps. Here are the general guidelines our program adheres to:


Audit and Forensics:


  • Identify the scope: Determine the scope of your audit, including the devices and systems that you want to include in your assessment.
  • Map your network: Create a map of your network to understand how devices and systems are interconnected.
  • Identify potential vulnerabilities and attack vectors: Use vulnerability scanners or manual inspection to identify potential vulnerabilities in your network, such as unpatched software, open ports, weak passwords, and unsecured wireless networks.
  • Analyze network traffic: Analyze network traffic logs to identify any suspicious activity or traffic patterns.


Penetration Testing


Simulating cyberattacks on a system, network, or application to identify vulnerabilities that could be exploited by malicious actors.

· Components and Systems

  • Web Applications: Websites, web-based platforms, and online portals.
  • Mobile Applications: Android, iOS, and other mobile platform apps.
  • Desktop Applications: Software installed on PCs, Macs, or other desktop environments.
  • Databases: SQL databases, NoSQL databases, data storage systems.
  • Cloud Systems: Cloud-based infrastructure, platforms, and software (IaaS, PaaS, SaaS).
  • Wireless Networks: Wi-Fi networks, Bluetooth, Zigbee, etc.

· Devices

  • Endpoints: Desktops, laptops, mobile devices.
  • Network Devices: Routers, switches, firewalls, hubs.
  • Wireless Devices: Wi-Fi routers, smart devices, IoT devices.
  • Embedded Systems and IoT: Smart TVs, fridges, cameras, home automation systems.
  • Servers: Web servers, mail servers, FTP servers, virtual servers.

· Network Protocols

  • HTTP/HTTPS: Web traffic.
  • FTP: File transfer protocol.
  • SMTP/POP3/IMAP: Email services.
  • SSH: Secure shell for secure remote logins.
  • Telnet: Remote command execution (less secure than SSH).
  • DNS: Domain Name System.
  • SNMP: Simple Network Management Protocol.
  • NetBIOS: Used in older Windows networks.
  • LDAP: Directory services.
  • oMB/CIFS: Server Message Block/Common Internet File System, used for file sharing.

Enhanced Security Posture:

  • Develop a remediation plan: Based on your findings, develop a remediation plan that outlines the steps needed to address any vulnerabilities or weaknesses in your network.
  • Implement security best practices: Implement security best practices, such as using strong passwords, keeping software up-to-date, and regularly monitoring your network for suspicious activity.
  • Testing your security and security awareness strategy:
  • Test your backup and recovery procedures: Test your backup and recovery procedures to ensure that you can quickly recover from a security breach or data loss.


Another important factor in home network vulnerability assessment is education. 

It is important to educate yourself and other members of your household about safe online practices, such as using strong passwords, avoiding suspicious emails or links, and keeping software and firmware up-to-date.

Contact Us

Copyright © 2023 Gerbear Services  - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept