Commonwealth Sentinel provides Incident Response service.
An overview of the steps taken includes: Locate the threat, analyze the threat, contain the threat, eradicate the threat, recover from the threat, and then prepare for any future threats. We will take the necessary steps to recovery while implementing a forensic methodology to help your company.
Many procedures and processes are dictated by regulatory compliance, and industry standards. A big factor is the value of your data assets (what will be the impact if your data is lost or stolen, or if business processes are interrupted?). How you value your company will determine how often you will need our services.
Vulnerability Assessments offer detailed insight into the vulnerabilities present in your environment. Pen Tests take this a step further by showing a proof of concept for the vulnerability to be exploited.
Cyber hygiene is a colloquial term that refers to best practices and other activities that computer system administrators and users can undertake to improve their cyber security while engaging in common online activities, such as web browsing, emailing, texting, etc.