Services Offered
Effective security is layered, therefore, each part of our services are meant to build on the others and together they give your organization the greatest ability to protect your data.
INFORMATION SECURITY AUDIT
Red Thorn Security Group provides in-depth information security audits based on the NIST Cybersecurity Framework (CSF) and FFIEC IT Examination Handbooks. Red Thorn’s goal is to help organizations identify information system shortcomings so that the organization can effectively mitigate the risk of attack from the many nefarious individuals who seek to exploit vulnerable information systems.
Information Security RISK ASSESSMENT
Red Thorn performs information security risk assessments based on the NIST Cybersecurity Framework (CSF) or FFIEC IT examination handbooks. After an information security audit, an accompanying risk assessment can help an organization build a plan to protect the organization based on a process of implementing the most important controls with the most significant threat first.
SOCIAL ENGINEERING PENETRATION TESTING
Often the most vulnerable aspect of an organization’s information security program is the people responsible for its implementation. Red Thorn’s social engineering engagement tests the implementation and followthrough of your policies and procedures through subversive techniques aimed at evaluating your personnel’s response to attacks.
WEB APPLICATION EVALUATION
The face of an organization is often its website. Allowing for vulnerabilities to go unchecked can lead to the face of your organization being shut down resulting in profit loss and damage to your reputation. Web application assessments identify vulnerabilities in your website which can help to mitigate the risk of website interruptions.
Incident Response Tabletop Testing
Strengthen your organization’s defenses with expert-led tabletop testing! Our tailored simulations help you uncover vulnerabilities, enhance your team’s response capabilities, and ensure compliance with industry standards. We guide your key stakeholders through realistic scenarios, offering actionable insights to improve your incident response plans and build resilience against cyber threats. Protect your business, boost preparedness, and ensure peace of mind—partner with us for your next tabletop exercise!
SOCIAL MEDIA EVALUATION
Social media is an important aspect of the life of most people as well as most organizations. However, social media posts can divulge sensitive information about an organization that can then be used to extract data from the organization. Red Thorn’s social media evaluation service assesses the organization’s social media accounts as well as the accounts of the organization’s employees accounts.
SECURITY PROGRAM DOCUMENT CREATION (COMING SOON)
Developing comprehensive policies and procedures is typically a heavy lift for small and large organizations. Red Thorn offers policy creation which helps to ensure compliance with the most important aspects of your information security program.
WIRELESS NETWORK AUDIT | PENETRATION TESTING
Wireless networks (Wi-Fi) are becoming more and more common in business environments. Although wireless connectivity offers convenience and flexibility, it also offers a potential vector of attack from nefarious individuals who can attack your network from outside the confines of your controlled building. Red Thorn will test the effectiveness of your wireless network security through penetration testing and a policy and configuration audit.