Network Security Services

Hawes Technologies specializes in security and compliance Network Audits for City and County governments. Our Network Audits are designed to uncover all existing and potential threats to your Network’s Security.

No Network is ever 100% secure, yet regular, annual Network Audits that assess and evaluate everything that goes on in your Network, can greatly reduce the threats to your system.

Hawes Technologies also helps government entities create and implement policies in line with HIPAA, PCI.

Risks to Network Security

Evolving Networks

Network demands change as organizations evolve, grow and shrink. System mergers take place, and equipment & devices pass from one operational team to another, exposing Networks to many vulnerabilities.

Unsecured Network Assets

Unchecked and improperly secured hardware devices and software can be added to a company's network by anyone within the organization, often without the Network Administration's awareness.

Bring Your Own Device (BYOD)

BYOD use has increased exponentially, with over 80% of organizations now allowing employees to use personal devices to connect to corporate networks. While this provides a cost saving advantage to the employer, and a convenience for the employee, it also exposes your organization's network to major security issues.

Spear Phishing Attacks (SPAs)

SPAs are designed to infiltrate a Network and access sensitive data. Appearing to come from a trusted source, SPAs are delivered through emails that contain a link. Clicking this link usually results in the download of malware, spyware and/or Trojan Horses.

Removable Media

Removable media, such as MP3 players and USB devices can bring harmful malware into your Network System, as well as steal sensitive data out of it.

Network Upgrade & Refresh

If Networks are not updated and refreshed on a regular basis (preferably yearly), security can become compromised - Before upgrading, you will want to perform a Network Audit to access what is going on in your system. For instance:

  • Which devices are still supported by current vendors (both software and hardware),
  • Which devices to replace, and
  • Which ones to upgrade.

Network Security Services Include:

Network Penetration Testing

Tests & verifies the security of your company's IT systems, networks, perimeter security controls and web applications, and recommends safeguards to strengthen your level of protection.

Network Security Maintainance

Hawes Technologies offers proactive and scheduled maintainance for your server, storage and backup systems.

Network Audit

Identifies potential vulnerabilities within the physical network, connected servers and network devices, including:

  • Running Services: Any service that is running on a network device can be used to attack a system. A solid network security audit will help to identify all services and turn off any unnecessary ones.

  • Open Ports: A network security audit will help to identify all open ports on network devices. All unneeded ports should be closed to eliminate the possibility of being used to attack a network device.

  • Open Shares: Any open share can be exploited and should not be used unless there is some essential business purpose for it.

  • Passwords: Assessments/audits will evaluate the enterprise password policy and ensure that passwords used on the network devices meet the business password policy of password strength, frequent change, and other requirements.

  • User Accounts: During an audit, it must be determined which user accounts are no longer being used so that they can be removed or disabled. Unused user accounts allow for someone inside or outside the network to attack and take over the account or may be an indication of an already successful attack of the network.

  • Unapproved Devices: Unapproved or unknown devices such as iPods, Smart Phones and Wireless Access Points installed on your network must be detected in an audit. Any or all of these, as well as other devices, can be used to attack the network or steal data off the network.

  • Applications: The type of applications being used on a system should be identified during this process. If any dangerous applications are found running on a system, they should be removed. A network security audit would also look for software programs that run automatically because they can be an indicator of a malware infection.

Network Security vs Cyber Security - The Difference

Network security deals with keeping an entity’s equipment and data secure. Cyber security focuses on protecting a company’s equipment and data from risks that originate from its Internet connection and beyond.

Hawes Technologies offers a low-cost Cyber Security Pre Assessment. Learn About Our Cyber Security Services or Contact Us for more information.