- Views 33
What you get with this Offer
Why do you need this:
-Cybercrime\hacking\vulnerabilities all exist in *every* network
-You might not have the expertise required to identify vulnerabilities, some very simple to resolve
-Security incidents cost even small businesses hundreds of millions of dollars a year, but can often be avoided by the small cost of being proactive
Internet scanning and penetration testing - I'll look at what types of service(s) you're business has exposed to the Internet, and whether there are any additional services that show up that shouldn't; these could include internal resources such as websites, databases or applications. I'll also look for standard Internet vulnerabilities and any additional abnormalities that may be obvious.
Remote access devices\methods - I'll review and assess whether there are any vulnerabilities in the inventory of devices and components that will utilize any types of access\remote access or similar service. I'll also perform an interview by phone or chat to assertain that there is adequate physical security at the location(s). We will review, discuss, and ensure there is an established communication plan and services for access requests, credential management and incident/help desk support. If a third-party exists that provides some of the above, I'll evaluate and assess the security policies of the third-party accessing the service.
Change management\Governance - I'll make sure that there is a clear and concise policy\plan around change-management. We'll review the current architecture (ie on-prem, colocated, fully hosted\outsourced, cloud, hybrid, etc) and the current technologies in place and ensure they meet current standards. We will review business continuity as it relates to the business, and ensure there is an adequate backup and disaster recovery plan\methodology in place.
What You Get:
I will deliver a detailed report including the current state of the 'network' addressing all of the above. I will set aside time to discuss this report with the stake-holder, and explain anything that may be unclear. If there is some remediation required, we can discuss what that looks like as well as next steps.
Get more with Offer Add-ons
I can remediate policies and rules on your firewall or router
Additional 2 working days+$500
I can remediate current backup\disaster recovery scheduling
Additional 1 working day+$300
I can review users\groups and identity management and remediate\change
Additional 1 working day+$300
I can upgrade\update vulnerable devices (Wifi AP's, servers, switches, printers, etc) - per device
Additional 1 working day+$75
I can create and deliver a technology plan for your business going forward
Additional 3 working days+$500
I can deliver all work in 1 working day+$600
What the Freelancer needs to start the work
I'll require access to people who have the technical information and are available for at least a few conversations
I'll need access to devices I discover on the network, plus admin rights in some cases
Depending on the strategy you're business has in place, I may need permission and or access to contact any third party providers you work with.
I'll need some lead time to schedule debriefs and meetings
I may need you to give me an NDA, for you're own protection and the protection of my reputation