IT Network Security & Penetration Testing

Safeguarding customers’ confidential information is important to any business, but it is especially important for companies that collect and store non-public customer financial information. As regulations and compliance issues regarding your organization’s information and security systems become more complex, uncovering and addressing IT security issues before an incident occurs can be vital.

E-Investigations offers a comprehensive suite of services that guarantees your organization an improved network security and IT security environment. Starting with the assessment phase, we will help you identify vulnerabilities in your network and provide you with an action plan to address them. Once the assessment phase is complete, we can help validate your remediation efforts by performing external and internal penetration testing. To ensure that your security efforts maintain a positive direction, we also offer security awareness training so that your users can do their part to ensure the security of your information assets. All of E-Investigations services can be utilized to aid in your regulatory compliance with:

  • The Sarbanes-Oxl Act, Section 404
  • Payment Card Industry Data Security Standard (PCI DSS)
  • The Gramm-Leach Bililey Act (GLBA)
  • The Health Insurance Portability and Accountability Act (HIPAA)

At E-Investigations, we make a detailed, comprehensive evaluation of your IT security and network security while identifying issues requiring your attention and suggesting solutions so you can take positive action. We’ll show you how implementing these solutions can help ensure the confidentiality, integrity, and availability of your information assets and ensure peace of mind for your employees, management, and board of directors. We provide a wide range of services, including.

  • Comprehensive Security Assessments
  • Internal and External Network Network Breach Assessments
  • Social Engineering Testing
  • Internal Controls Assessments
  • Policy Review
  • Risk Assessment Facilitation
  • Security Awareness Training
  • Business Continuity and Disaster Recovery Planning

Once complete, you’ll receive a written report that identifies all vulnerabilities in your network security and offers practical solutions that can be implemented within your organization. We’ll also help you prioritize those solutions, giving you a step-by-step process through which you can reach your IT security goals. Other benefits include:

  • Assessments that touch all aspects of your operation, incorporating physical, administrative, and technical components of your IT security processes.
  • Utilization of up-to-date vulnerability datavases
  • Experience in a wide range of clients and industries

Let the professionals at E-Investigations help you resolve the issues that can affect your IT security systems and processes.


IT Security Assessments

Timely identification and remediation of network vulnerabilities is something every organization needs done before hackers or disgruntled insiders exploit the weaknesses. The process of identifying vulnerabilities, evaluating the risk, remediation, and reporting for IT security is called vulnerability management. By using a formal vulnerability management process, organizations are able to more efficiently find and fix security vulnerabilities within their network, improving network security.

Our experts test for network security weaknesses while providing suggestions for improvement. Testing allows client management to be confident knowing what vulnerabilities may exist and provide the opportunity to develop a plan to address any issues.

Certified security professionals are proficient in network security techniques and system exploits with knowledge on multiple network platforms. You receive written descriptions of each vulnerability identified with specific backgrounds, consequences, and remediation instructions. These are further analyzed and reported with prioritization and understandable suggestions.

Internal Network Security Breach Assessments: IVA

The Internal Network Security Breach Assessment can be performed in conjunction with the External Test and includes an in-depth analysis of the customer’s internal network security. It is estimated that approximately 80% of security breaches occur from inside the internal network. This Network Security Breach Assessment will analyze the risks to internal devices and suggest specific hardening techniques to resolve any concerns that are identified.

External Network Security Breach Assessments: EVA

Vulnerabilities that may exist between a customer’s external network and the Internet. This service simulates various electronic attack methods that could be launched against an Internet access point.

Wireless Network Security Assessment: WNA

Wireless technologies do not have the physical access restrictions used in traditional wired environments. They make it possible for someone in the lobby, the parking lot, or across the street to have access to a network carrying sensitive financial or corporate data, personnel or customer information, competitive data, or trade secrets. Our assessment will help you to identify insecure wireless implementations that put your organization at risk. E-Investigations utilizes wireless equipment and tools to locate and assess wireless networks and rogue access points. We will review policies and procedures, architecture, configuration, and monitoring procedures for alignment with industry best practices.

  • Discovery of all wireless access points and clients–E-Investigations performs a site survey to discover all existing wireless access points and clients. E-Investigations will also note any external wireless network whose signal range enters your premises. Optionally, E-Investigations can map all access points to a floor plan, if available.
  • Validation of wireless network perimeter–One of the reasons wireless security is so complex is wireless networks are not limited to the physical boundaries of your buildings. Using directional antennas, E-Investigations maps the actual perimeter of your network that is vulnerable to war drivers. We also provide advice on how to limit unnecessary exposure to the outside world.
  • Vulnerability and penetration testing of access points– Using a variety of tools, E-Investigations will sniff and capture ongoing wireless traffic and attempt to compromise the utilized encryption and break into wireless access points and clients.
  • Configuration review of access points and wireless clients– E-Investigations will review the configuration of wireless devices. We validate the configuration by comparing it against a random sampling of access points and clients to check that deployments are consistent with these guidelines.

Penetration Testing

Penetration testing is a method of probing and identifying security vulnerabilities in your network and the extent to which they could be exploited by a hacker. These tests are typically performed using automated tools that look for specific weaknesses, technical flaws, or vulnerabilities to exploit. The results are presented to the system owner with an assessment of their risk to the networked environment and a remediation plan highlighting the steps needed to eliminate the exposures.

Vulnerability management and penetration testing work hand in hand to close any potential openings available to corporate attackers. Together, vulnerability management and penetration testing enhance security and lessen the probability that the criminals could penetrate your systems.

We perform these tests using an evolving process that includes cutting-edge tools, mimicking the activity of a determined hacker.  Instead of a “canned” approach to testing, we tailor our procedures according to your specific needs and concerns, helping to increase the cost-effectiveness of this service.  The depth of the penetration testing can be established at your discretion – from basic attempts of unauthorized access and web-site defacement to full-scale denial-of-service.

Each penetration test includes a detailed report of any identified vulnerability, classified by the likelihood it could be exploited and by the impact that it might have on the company’s network.  The data from these periodic Network Breach Assessments and/or penetration tests could be compiled throughout the year and presented in consolidated format in an annual report.

Please note that the Network Breach Assessment is more thorough than the Penetration Test, as it considers a wide array of internal components.  It may be advantageous to perform Penetration Testing subsequent to addressing issues identified during a Network Breach Assessment.

Social Engineering Testing

The human element of your company’s security may be tested, along with your fixed information systems.  These tests are tailored to your objectives and highly customized to fit your situation.

The weakest link in any security program is an organization’s people; attackers take advantage of this weakness through social engineering. Social engineering is a term that describes the non-technical intrusion into an organization that relies on human interaction, often involving tricking people in order to break normal security policies. Similar to traditional “con games” where one person is duped because they are naturally trusting, attackers will use any technique to gain unauthorized information. Social engineering techniques include everything from phone calls with urgent requests to people with administrative privileges to trojans lurking behind email messages that attempt to lure the user into opening the attachments.  E-Investigations will attempt to by-pass the people who enforce your security through a variety of means, such as the following:

  • External Social Engineering – E-Investigations will perform Social Engineering phone calls to individuals within the organization. Targets will include individuals from the help desk, IT department, human resources, finance, and other departments within the organization. The objective of these calls will be to induce the users to divulge sensitive information over the phone in violation of company policy.
  • Targeted Email “Phishing” Attacks – Emails will be sent to individuals and groups within the organization in order to attempt to entice the user to click on an external link that will either attempt to gather sensitive information or deliver a malicious payload onto their desktop system which could include browser and operating system buffer overflows, Trojan horses, and keystroke loggers.
  • Malicious Portable Media – USB Flash drives and CD-ROM drives with enticing labels such as “Salary” will be left in public areas such as hallways, restrooms, and break rooms. The media will contain simulated malicious code that will attempt to grab sensitive host information such as the network configuration, list of running processes, and a password hash dump.
  • Sensitive Document Disposal Audit – “Dumpster Diving” – E-Investigations will search internal trash receptacles and external dumpster and disposal areas for sensitive documents or storage media that is disposed of in violation of company policy.