• Skip to main content
  • Skip to footer

Commonwealth Sentinel

Cyber Security for local government, non-profits and small business

MENUMENU
  • Home
  • About Us
    • Sheri Donahue
    • Leo Haggerty
    • Careers
  • Services
    • Vulnerability and Threat Evaluation
    • Transformation Management
    • CISO Management Services
    • Incident Response Management
  • News
  • Blog
  • FAQs
  • Contact Us

commonsent / July 29, 2021

Behind the scenes peek at why a Cyber Security Assessment is critical

There are several reasons why an organization would have a cyber security assessment done.

First, even the best cyber security program should be evaluated to see if there are any gaps. A third-party assessment can identify those gaps and if/where there are any open ports through which a cyber criminal can access your system before it’s too late. While it may identify one or two devices on your network that need updates, even if 0.1% of your devices are not secured, you are open to attack. All it takes is one weak point.

Additionally, by having a third party run a penetration test, you can vet how resilient your system is to a hacking attempt. The testers are looking not just at vulnerabilities but also whether a real threat exists to exploit that vulnerability (that is, whether a bad actor can get into the system).

Cyber security is similar to wargaming. The more testing and exercising you do to identify weaknesses, the stronger you become and the better prepared you are to defend your system.

Another reason for a cyber security assessment is to evaluate where your level of security currently is so that you can identify what you need to do in order to improve. That is, to create a roadmap of improvements on your journey to security. In cyber security, you can NOT just “set it and forget it”.

This basic initial assessment will identify what your assets are (create an inventory), what your architecture is, if all devices have the latest security patches, etc. Since you cannot protect what you do not see, this is a critical first step.

Not only can this assessment help to identify a security roadmap, it can also provide a plan for how to bring in new devices to connect securely as well as identifying physical security protocols and processes/procedures your employees must follow to maintain your security.

The next step would be to implement these changes to include continuous monitoring to ensure that no cyber criminals are getting in. And most importantly, to ensure your policies are followed and your employees are trained.

While your organization may outsource its cyber security to a consultant, that does not mean that your employees do not need to worry about it. Cyber security is everyone’s job!  

Filed Under: Blog

Footer

CONTACT US

COMMONWEALTH SENTINEL

1230 US Highway 127 S
Suite #5
Frankfort KY 40601
(502) 320-9885

EMAIL US

ABOUT US

Cyber security consulting for local governments, non-profit organizations, and small businesses facing the threats of the cyber world.  At Commonwealth Sentinel, we are passionate about helping people be cyber-safe!

FOLLOW US

  • Email
  • Facebook
  • LinkedIn
  • Phone
  • Twitter
  • YouTube

Copyright © 2023 Commonwealth Sentinel

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT