Services



Services > Cyber Security Assessments

Cyber Security Assessments


RNT Cybersecurity Team supports organizations of all sizes in addressing the dynamic cybersecurity challenges and compliance requirements. Assessments will be conducted using industry best practices and following the protocols identified in the National Institute of Standards and Technology SP 800-53A. There are multiple activities in the assessment which will result in an Assessment Report.


External Vulnerability Scan


Identifies any vulnerabilities seen from outside your network, i.e: what the hackers see.

Internal Vulnerability Scan


Identifies internal vulnerabilities which might trigger from inside the client network.

Internal Policy Review


Ensures a valid, written Information Security Plan is in place and in practice.

Roadmap to Compliance


With full evaluation completed, a written plan for compliance will be developed detailing steps to be taken to help ensure compliance and to eliminate risk. This plan is reviewed in a joint staff with the RNT team, your IT team and operational staff.

Risk/Vulnerability Assessments


This technical assessment defines, identifies and classifies security holes or vulnerabilities in a computer, network or communication infrastructure.

Process Assessments


These assessments follow the vulnerability assessment with an in-depth review of documented processes and practices which support compliance and minimize vulnerabilities.

Infrastructure Assessments


These assessments include assessing multiple aspects of an organization such as: mission, vision, staff, regulatory restrictions, current state and desired/required strategic state.