Currently set to Index
Currently set to Follow
Thought Leadership

Risk Assessment – The 3 Components

Companies are at risk because of gaps in their technology security practices. A third-party risk assessment is important for identifying your security posture and taking steps to reduce your risk profile.

A Risk Assessment

A risk assessment includes creating an asset inventory, scanning that inventory for security gaps, and creating a comprehensive report that can be used for developing a plan of action for prioritizing the next steps for closing the security gaps discovered during the scan.

Asset Inventory

The first step of a risk assessment is to run a scan on the network to see what devices are plugged into it.  In many instances, we find that there are devices plugged into the network that were previously unknown.

The Scan

The next step is to scan the network for software vulnerabilities that have been published by vendors. Once a flaw is found it is cataloged and the scan continues.

For an organization that has 10 to 25 servers and workstations, switches, routers, etc.  A scan can find between 5,000 – 7,000 vulnerabilities on the network. 

Any number of reports are available, but it is often helpful to focus only on the critical vulnerabilities that can be exploited over the network.  A report like this can provide an administrator with a subset of exploits to be addressed. 

A third-party risk assessment is important for improving your security posture and reducing your risk profile. Assessments should be run on a regular basis to guide your efforts to improve security on daily basis.

For more information, send us an email by clicking here.

  • Industry

  • Category

  • Regulation

  • Solution