Cybersecurity Assessment

Putting a Stop to Unauthorized Access to Your Data

Stories about compromised computer systems make news headlines all too often – especially in recent years – and the associated price tag can be staggering. According to IBM’s Cost of Data Breach Report, 2021 had the highest average cost for companies in the 17-year history of the report – a staggering $4.24 million (up $380,000 over 2020).

If you don’t want to be the next big headline (and nobody does), you’ll need a deep understanding of your vulnerabilities and risks.

How  remote working is impacting compliance

The average cost was $1.07 million higher in breaches where remote work was a factor in causing the breach, compared to those where remote work was not a factor.

In this podcast, Barnes Dennig cybersecurity practice leader and Director Robert Ramsay talks with Pondurance managing consultant Brett Bane about the impact of remote work and the pandemic on cybersecurity and compliance. Companies need to secure their networks, and that requires more than a firewall and anti-spam software.



That’s where we can help.

We’ll review your cybersecurity practices and implementation to identify the gaps that exist in your network security. And we’ll find any vulnerabilities in your system and help you strengthen them, so you can rest easy.

When testing your network security, we’ll look at policies and procedures related to:

  • Network configuration
  • Data encryption
  • Password usage
  • Updated virus protection
  • Known vulnerability scanning
  • Endpoint protection
  • Cloud computing
  • Third-party access
  • Vendor management
  • Employee cybersecurity training
  • Patching & system maintenance

Our findings and recommendations report will include the detailed steps taken and the sample results of testing. We’ll share assumptions about the people and infrastructure that are important parts of the security process.

And you can trust what you’re reading. We’ve got the credentials to prove it:

Learn how can help you prevent unauthorized access to your systems.