Threat Assessment Program 2021-02-23T18:40:36+00:00

Assess Your Organization’s Cybersecurity Risk

Buchanan’s threat assessment program identifies gaps in your current defense posture and uncovers weaknesses across a broad swath of your security technologies

Businesses’ cybersecurity programs are increasing in complexity, with the average business having over 40 security tools in their arsenal. While enterprise cybersecurity programs are the key to effective IT security, having visibility to the types of threats that exist in your environment will ensure your
program’s success.

Contact Us

Cybersecurity Statistics to Know:

– 92.4% of all malware and 49% of successfully installed malware was delivered by email (Verizon, 2018)

– The number of security breaches has increased by 11% since the start of 2018 and by 67% since the start of 2014 (Accenture, 2019)

– Organizations’ cyber-crime costs increased by 12% between 2017 and 2018, from $11.7 million to $13 million (Accenture, 2019)

– 70% of breaches were caused by outsiders, 45% involved hacking, 86% were financially motivated, 17% involved some form of malware, and 22% featured phishing or social engineering (Verizon, 2020)

– 15% of organizations leave more than 1 million files and 22% of all folders accessible to employees (Varonis, 2019)

Threat Assessment Tiers Include:

Tier 1

Email Security assessment | Quantify the amount of unwanted, malicious, and risky email reaching your users

Microsoft 365 assessment | Assess your Microsoft 365 security and compliance measures, comparing your settings against the CIS 365 benchmarks to protect against breaches due to misconfiguration issuesperformance

Tier 2

NGFW assessment | Validate your firewall’s security capabilities by enumerating all of the threats that make it past your current firewall solution

Secure SD-WAN assessment | Identify potential for SD-WAN leveraged network efficiency improvements by calculating application usage, network utilization, and efficiency opportunities

Tier 3

Compromise assessment | Are you currently compromised? Our threat hunters will utilize scalable memory forensics to determine if you currently have any active threats in your network, or have had them in the recent past

Managed Detection & Response assessment | Catch what your current managed SOC may be missing, or discover the dramatic increase of visibility into security threats by introducing 24/7 managed detection and response into your environment by deploying a full-blown SIEM and EDR for a month