Effective Information Security Starts Here
CityBannerRed.png

Services

Service. Integrity. Compliance.

Services Offered

Effective security is layered, therefore, each part of our services are meant to build on the others and together they give your organization the greatest ability to protect your data.


INFORMATION SECURITY AUDIT

Red Thorn Security Group provides in-depth information security audits based on the NIST Cybersecurity Framework (CSF) and FFIEC IT Examination Handbook. Red Thorn’s goal is to help organizations identify information system shortcomings so that the organization can effectively mitigate the risk of attack from the many nefarious individuals who seek to exploit vulnerable information systems.

RISK ASSESSMENT

Red Thorn performs risk assessment based on the NIST Cybersecurity Framework (CSF). After an information security audit, an accompanying risk assessment can help an organization build a plan to protect the organization based on a process of implementing the most important controls with the most significant threat first.

SOCIAL ENGINEERING PENETRATION TESTING

Often the most vulnerable aspect of an organization’s information security program are the people responsible for its implementation. Red Thorn’s social engineering engagement tests the implementation and followthrough of your policies and procedures through subversive techniques aimed at evaluating your personnel’s response to attacks.

WEB APPLICATION EVALUATION

The face of an organization is often its website. Allowing for vulnerabilities to go unchecked can lead to the face of your organization being shut down resulting in profit loss and damage to your reputation. Web application assessments identify vulnerabilities in your website which can help to mitigate the risk of website interruptions.

SOCIAL MEDIA EVALUATION

Social media is an important aspect of the life of most people as well as most organizations. However, social media posts can divulge sensitive information about an organization that can then be used to extract data from the organization. Red Thorn’s social media evaluation service assesses the organization’s social media accounts as well as the accounts of the organization’s employees accounts.

 

SECURITY PROGRAM DOCUMENT CREATION (COMING SOON)

Developing comprehensive policies and procedures is typically a heavy lift for small and large organizations. Red Thorn offers policy creation which helps to ensure compliance with the most important aspects of your information security program.

WIRELESS NETWORK AUDIT | PENETRATION TESTING

Wireless networks (Wi-Fi) are becoming more and more common in business environments. Although wireless connectivity offers convenience and flexibility, it also offers a potential vector of attack from nefarious individuals who can attack your network from outside the confines of your controlled building. Red Thorn will test the effectiveness of your wireless network security through penetration testing and a policy and configuration audit.