From the development labs of Houdini Security Global…
Nationwide S.W.A.T. Results |
||||
Security |
Target |
Cumulative |
||
Type |
Score |
Score (U.S.) |
||
IT |
100 |
79.4 |
||
SCADA |
100 |
62.1 |
||
Physical |
100 |
55.0 |
||
Excellent |
Keep it up! |
Good |
improvement recommended |
Fair |
Improvement & training recommended |
Caution |
Outside assistance recommended |
Warning! |
Time to start hiring (prime target for attack) |
* Scores typically range from 50-125
S.W.A.T. away cyber issues as easy as a fly swatter!
Introducing a new tool that detects cyber security flaws, anomalies, and recommends improvements and enhancements… the Security Weakness Assessment Tool (S.W.A.T.). Using Artificial Intelligence, machine learning, and statistical analysis, this one-of-a-kind, state-of-the-art testing tool identifies potential cyber problems (with detailed explanations and remedy recommendations), as well as highlighting the good cyber solutions that have been implemented. It analyzes your entire cyber security structure, quantifies it, identifies security flaws, makes recommendations for security hardening and improvement of IT, SCADA or the Physical security environments, and compares it to a national average to show how your organization compares to the rest of the cyber world! It’s the first-of-its-kind tool that demonstrates what you’re doing right, and what you’re doing wrong!
Here are 2 SAMPLE Questions:
Question #1:
What is the primary SQL database backup strategy your company employs?
a) >1 method listed
b Full offline
c) HOT
d) Incremental
e) Partial
Rationale: On average, 77% of clients surveyed indicated that data was the company’s most important asset to protect.
Recommendation: The more kinds of backups you perform, the better chance of a full recovery in the event of an attack (i.e. Ransomware, theft), data compromise/failure, or natural disaster. Implement all backup strategies.
In our analysis, we deem the best answer to be “a”, while the least favorable reply would be “e”.
Question #2:
My company enforces the 3-2-1 backup scheme.
a. True
b. False
Rationale: This simple, cost-effective method is fool-proof against ransomware, intrusion, system failures, and natural disasters. You should have at minimum 3 copies of your data on at least 2 different media types, with 1 backup copy completely offsite… preferably in another state or at least 150 miles away! Earthquakes, floods, and tornado’s can destroy cities!
Recommendation: If you don’t have a concrete backup policy, you need to get one in place ASAP, sooner now than later. The 3 copies should be physically alienated from each other.
Our experience dictates that the best answer is “a”, while answer “b” is least favorable.
Artificial Intelligence
These two questions, while seemingly separate, do interact with each other (through our AI engine) similar to a Venn diagram’s intersection, to determine part of your company’s vulnerability score. If you maintain more than 1 backup method (question #1), but don’t employ the 3-2-1 backup method (question #2), then your overall vulnerability score is lower than it would be if you already had the 3-2-1 backup strategy in place. In this example, our AI engine compares all related questions & answers about your backup strategy throughout the test to produce a complete evaluation of your strategy. It does this for all topics in the survey. This kind of “cross-evaluation” is done throughout the entire evaluation process of your enterprise, to give you the most reliable and accurate evaluation on the market!
Interaction between question #1 + question #2 = Score
CONTACT US today for pricing and availability. Take the next step in fighting cyber-crime, while protecting your enterprise! info.hsglobal@proton.me
“Quality Work… for a Quality Wage”
© 2024 Houdini Security Global – All Rights Reserved