At Turner and Associates Inc., we take a different approach than most of our competitors to Information Technology Security. While other companies will only review a sample of size of your LAN (internal) and WAN (external) devices, we review all the devices attached to an entire network. This holistic approach allows us to confidently assure our clients that we have located all the vulnerabilities on their networks during one of our point-in-time network security assessments. We use this approach because we are serious about Information Technology security. Our competitor's sample sized approach could leave unknown vulnerabilities on your network just waiting to be exploited. These vulnerabilities could ultimately lead to an incident ranging from a data breach to a denial-of service; any of which, are unacceptable for our client's business continuity. This holistic approach also significantly increases our client's security posture post remediation.
At Turner and Associates Inc., we have extensive network penetration experience for many clients in the Financial, Healthcare, and Government industries. Using a seven phased approach, we locate all internal and external based threats to our client's Information Technology infrastructure via true hacker-style techniques. Therefore, we do not run a vulnerability scan to locate network vulnerabilities; rather, we use it as a 'catch-all' after we have located many of findings using manual techniques.
Our security engagements can be divided into any combination of the following areas to be tested:
External Network Security Assessment – The scope of this assessment includes a full penetration test on all the devices within the external WAN. Devices in our testing may include Firewalls / Internet Accessible Servers / Remote Access (i.e. VPN's) / Routers.
Internal Network Security Assessment – The scope of this assessment includes a full penetration test on all the devices within the internal LAN. We will attempt to elevate our privileges all the way up to domain administrator access. Devices or areas in our in our testing may include data encryption, password strength, patch management, servers, SAN, e.g., storage systems wireless access points, and workstations.
Web Application Security – The scope of this assessment includes a full web application security assessment from both an unauthenticated and authenticated prospective. Through our penetration testing, we fully test and document the security on all Internet facing web applications. Our approach will not only test for OWASPs "Top-Ten" web application vulnerabilities, but other vulnerabilities, which may have not been discovered and remediated during an application's development lifecycle. Vulnerabilities discovered in our testing would include Injection cross-site scripting (XSS), broken authentication and session management, insecure direct object references, cross-site request forgery (CSRF), improper security configuration, insecure encryption, failures to restrict URL access, insufficient transport layer protection, and auto-redirection / forwarding vulnerabilities.
Wireless Network Assessment – The scope of this assessment includes a full wireless penetration in an attempt to gain access to the wired network within the internal LAN. Areas in our in our testing may include network management and monitoring capabilities, wireless signal patterns, wireless access point (WAP) configurations , WAP physical locations, network design, and vulnerability discovery.
Social Engineering Assessment – The scope of this assessment includes using social engineering techniques to gain access to user credentials, unauthorized physical access to a building or highly sensitive area, or confidential customer data. The tests performed in this area, is a direct test against a company's end-user awareness training program. Areas in our testing may include a fake phishing website, phishing emails, spoofed phone calls, and piggy backing (unauthorized physical access). We can also couple this area of testing with the internal network security assessment to offer a true "blind" penetration of a company's IT infrastructure. In our experience, very few clients request an unannounced "blind" security penetration test. These organizations are typically larger in asset size, have dedicated IT Security staff, and budgets large enough to support the cost of implementing solutions to not only detect but prevent attacks in real-time.
End-user Awareness Training – We can come onsite to a company's corporate office and train staff members in a group setting that provides guidance in IT security and attacks that are facing many organizations today. Our training presentations help elevate the overall knowledge of a company's end-users; thus, making your staff members a better first-line-of-defense in thwarting potential attacks. The areas presented may include social engineering, data breach incidents, incidence response, social media and their 'best' practices, or even regulatory and compliance areas.