Silver Technology Services LLC

Defensive InfoSec

SILVER BLOGS

SERVICES

  1. Network Vulnerability Assessments
    We'll perform scans of your network and evaluate the results, then follow up with more advanced targeted assessments. The scope of the exercise is determined by you - with our advice if you desire. We can evaluate your public Internet presence as well.
  2. Configuration Assessments
    Industry standard best practices are the basis for our review of your infrastructure configurations. We'll consider your network documentation along with the actual configurations of your routers, switches, wireless access points, servers, workstations, and firewalls. Then we'll advise you on improving your documentation, better securing your configs, and improving the overall security of your network.
  3. Security Policy Assessments
    We'll discuss your policy goals and then review your written policies to ensure they meet your requirements. We'll also consider how you train your employees and make recommendations for improving the policies and the process.
  4. Training
    We'll review your existing training programs and offer guidance and help you improve your current company and information security training programs. We can help you train your entire staff or implement a train-the-trainer scenario.
  5. Social Engineering Defense
    Silver Tech has extensive knowledge of social engineering tactics (including phishing and other purely electronic attack vectors). We are also engaged with the InfoSec community in order to remain on top of current events and trends. Let us help you by training your staff on how to resist these attacks and identify common attack methods. We can also follow up the training with a social engineering assessment and a phishing assessment. We'll work with you on the best strategy.
  6. Tailored For You
    Questions? We consider the size and complexity of your organization when designing an assessment program. Let us know how we can help improve your InfoSec posture.