Cybersecurity Assessment

Stopping Unauthorized Access to Your Data

Stories where a company’s computer system is compromised make news headlines much too frequently. Company data and customer information is suddenly published online or held for ransom. Do you know that your network is secure? Can unauthorized users gain access? You have to understand your vulnerabilities and risks to protect your working environment.

How COVID-19 and remote working are impacting compliance

In this podcast, Barnes Dennig cybersecurity practice leader and Director Robert Ramsay talks with Pondurance managing consultant Brett Bane about the impact of remote work and the pandemic on cybersecurity and compliance.


Companies need to secure their networks, and that requires more than a firewall and anti-spam software. When testing your network security, we’ll look at policies and procedures related to:

  • Network configuration
  • Password usage
  • Updated virus protection
  • Known vulnerability scanning
  • Endpoint protection
  • Cloud computing
  • Third-party access
  • Vendor management
  • Employee training
  • Patching & system maintenance

Our findings and recommendations report will include the detailed steps taken and the sample results of testing. We’ll share assumptions about the people and infrastructure that are important parts of the security process.

Certifications: Certified Information Systems Auditor (CISA) and Certified Information Technology Professional (CITP), HITRUST Certified CSF Practitioner (CCSFP)

Network Security Experience: We help business owners understand the gaps that exist in their network security. Our certified IT professionals can find vulnerabilities in your system and help you strengthen them so you can trust in your information systems.

The survival of your business may very well depend on your network security. We can help you prevent unauthorized access into your systems. Contact us to learn how.