Auditing

Regular audits are essential to ensure that your information security policy is being enforced and is effective. In a field where new threats appear everyday it is important to know that your policies are flexible enough to handle unforeseen threats and employ new mitigating technologies. To achieve these goals DeeDoc Forensics offers technology and administrative auditing services.

Administrative Policy Audit

Administrative policy is at the core of any solid information security plan. A strong administrative policy will assign responsibilities and provide a solid foundation for developing procedures. Auditing these policies ensures that they maintain a consistent tone and account for any new technologies or practices in place.

Risk Assessment

k assessments will identify critical systems and services as well as any reasonable threats to those assets. Once your risks have been complied we can offer mitigating solutions that range from policy updates and technology solutions to managed services.

Vulnerability Assessment

Network Vulnerability Assessments are critical in securing an organization’s network. Most organizations perform these assessments annually or quarterly at the most. The difficulty with this level of frequency is that new network vulnerabilities are discovered daily. Since networks often change due to patching, new machine installations, and many other reasons, your vulnerability posture can change just as often. We offer a variety of services:

  • External – this vulnerability scan uses hardware outside of your network to scan the outside of your network for vulnerabilities.
  • Internal – This option allows you to turn any supporting hardware into an internal scanner that searches for vulnerabilities within your network.
  • On Demand – gives you complete control over scan scheduling and allows you to schedule unlimited scans for unique hosts.
  • Managed – this version brings our expertise to you. We will configure and schedule a monthly scan for you. Our security experts will then review the outcome and discuss the findings with you. Additional consulting is available upon request as well.

Policy Compliance

Many industries have compulsory compliance policies the determine how information is handled and protected. We have expertise in interpreting and adapting these policies into your own administrative policy. From HIPAA and Sarbanes-Oxley to Red Flag Rules we have you covered

Scroll to Top