Information Systems and Cyber Security

Cyber Security Vulnerability Assessments

CSI delivers actionable recommendations based on a systematic audit and technical assessment of a company’s cyber landscape, using industry best practices. When it comes to data breach and insider threats, what you don’t know can hurt you. Companies face IT risks daily from both internal threats and external intrusions. At CSI we recognize that one size does not fit all and the key to successful information risk assessments and data breach prevention is achieving and maintaining the right security level for your organization.


Our cyber security experts are Certified Information Systems Security Professionals, Certified Information Security Managers, and Certified Ethical Hackers. They are former career law enforcement agents, network intrusion specialists, cyber investigators, forensic computer scientists and networking professionals – people who speak the same language as your internal IT staff. Our team performs the in- depth analysis necessary to assess the security posture of your cyber systems and networks that your IT staff doesn’t have the time or resources to conduct.

The CSI Vulnerability Assessment team will produce actionable recommendations for your business to navigate the cyber threat landscape affecting your organization and reduce your information security risk. We will provide a clear understanding of the potential impacts on physical security resulting from cyber security threats.

At CSI we provide a full range of internal and external risk assessments to evaluate your systems, applications, and processes for a variety of vulnerabilities, including:

  • Critical Systems Assessments
  • Information Security Assessment and Analysis
  • Network Security Assessments
  • Penetration Testing
  • Wireless Access Assessments
  • Policy Review and Design

Network Security Assessments

Network Security Testing helps organizations identify and demonstrate vulnerabilities and determine actual risk, validate security defenses against simulated attacks and meet compliance mandates. CSI takes a security-centric approach, instead of one driven by compliance. Our expert testers work with you and your organization to determine the right cyber security tests and assessments to develop an overall stronger security posture.

Our cyber security consultants can provide an assessment of your networks, systems, facilities and employees. Through use of “real-world” strategies and tactics used by threat actors, we can take your organization's assessment to the next level by determining where your security is strong and where gaps exist that could lead to a compromise. We combine our assessments with other services such as Penetration Testing, Social Engineering and Blue/Red Team scenarios.

Penetration Testing

At CSI we know that protecting your organization starts with understanding your ability to prevent

Penetration testing uncovers weaknesses in your cyber defenses by conducting a simulated cyber-attack on your organization’s network. How easy is it for criminals to access your organization’s data? Does your organization have adequate safeguards in place to detect a network intrusion? What actions do you take when an intrusion is detected? What about social engineering (a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter) — do you feel confident that employees would recognize a phishing attempt? 

Employees still represent a possible weak link in security for many organizations. Social engineering your employees is the most effective way to test workers against non-technical threats posed by social engineers. Teaching your employees Social engineering methods is the most effective way to protect against it.

CSI’s experts apply their real-world knowledge of threats to identify and exploit vulnerabilities that could be used to breach your organization’s security by analyzing internet-facing systems for weaknesses that could leave sensitive information vulnerable to attack, including:

  • SQL injection, cross-site scripting, and other application vulnerabilities

  • Out-of-date and un-patched systems

  • Improper system configuration

Social engineering tactics, such as phishing: click and log, phishing: endpoint attack, vishing and malware-infected portable media.

Our penetration experts will work closely with you to devise testing based on your organization’s security goals. Upon completion of penetration testing and analysis your organization will receive a detailed report with actionable recommendations for addressing vulnerabilities. We will offer a range of recommendations based on your budget and the threat level.

Wireless Access Assessment

CSI understands that physical boundaries do not necessarily prevent unauthorized access to an organization’s networks.

We know that site surveys ensure successful and efficient wireless network deployment. A Wireless Assessment is a thorough audit of the wireless infrastructure in your organization. The audit includes discovery of access points and deployed encryption methods, detection of signal bleed outside the facility and review of the wireless infrastructure diagrams and policies.

Malicious intruders are constantly probing network access points for vulnerabilities and weak security controls in order to compromise network defenses. The growth in access to networks through wireless technologies has expanded the potential for intruders and increased risk to organizations.  

Organizations have more risk than home users and need to ensure a secure implementation of a wireless network. Common issues for wireless implementations are using weak encryption protocols, unauthorized installation of a wireless access point or the improper configuration or network access policy, for example a guest wireless network that unintentionally allows access to internal network resources.  

Policy Review and Design

Your network security policies will define your organization's information security goals. In a changing environment, businesses have rapidly changing information security needs. Your organization likely has policies in place aimed at keeping information secure and ensuring corporate policy design is maintaining pace with your dynamic risk environment will help protect your organization.  

Keeping up with modern threats and information security issues is a full-time job; regular policy review with expert consultants will allow you to keep ahead of changes in the information landscape and address areas of concern before they become significant problems for your organization.

With CSI, you can feel confident that you’re taking the steps necessary to strengthen your organization’s policy design. Once we’ve completed the policy review process, we’ll analyze our findings to identify issues that could potentially lead to failure, prioritize steps that can be taken to mitigate risk, and assist your organization in developing an actionable remediation plan.