Cybersecurity Risk Assessments

No one wants to spend more on cybersecurity than they need to. Our cybersecurity risk assessments provide a detailed Cyber security risk assessment report to reveal your security gaps and help you choose only the cybersecurity tools and services your business needs.


Starter Risk Report

New to cybersecurity? We recommend every business start by assessing the security of your foundational technology systems.

In-Depth Risk Report

Next we recommend looking at your custom applications and a big risk area – the cybersecurity skills of your employees.

Compliance Reports

If you work in financial, healthcare, education or other regulated industries, we offer reports to show compliance.

Starter Cybersecurity Risk Report

New to cybersecurity? We recommend every business start by assessing the
security of your foundational technology systems.

Network

Firewall

Web Gateways

Email Services and Encryption

Laptop + Desktop
Security configuration management

Asset Management

What it includes:

Security Questionnaire

Interview with NeuralStrikes
Security Expert

Starter Cyber Risk Report and
Recommended Services


Request a Free starter report

In-Depth Cybersecurity Risk Report

In this cybersecurity risk assessment we go beyond the foundational systems – network, firewall, web
gateways, email service, laptop + desktop computers, mobile devices – and look at your critical business data,
proprietary applications, employee phishing knowledge and employee productivity data on-prem or in the cloud.

Network

Firewall

Web Gateways

Email Services and Encryption

Laptop + Desktop
Security configuration management

Asset Management

Critical Customer + Business Data

Proprietary + Custom Applications

Employee Phishing Knowledge

Employee Productivity Data in the Cloud

What it includes:

We begin with your network, firewall, web gateways, email service, laptop + desktop computers, and mobile devices. Next we take a deep dive into your business critical data – customer data, employee data, product data, sales + transactions, human resources data, accounting + legal documents, marketing assets, knowledge base content, employee emails, and more. Then we look at the setup and configuration of your propriety + custom applications. And finally we review your employee phishing knowledge and employee productivity data in the cloud through systems like Microsoft Office 365, Salesforce, Amazon Web Services, Google G Suite, Box, Slack, SAP Concur, Jira, Zoom, Cisco Meraki, DocuSign, Zendesk, Dropbox, ADP, and ServiceNow.

Security Questionnaire

Interview with NeuralStrikes
Security Expert

Starter Cyber Risk Report and
Recommended Services


Request an in-depth report

Regulatory + Compliance Reports

The Cybersecurity compliance rules are complex but meeting government and industry regulations is critical to your business future. Together we’ll identify which regulations apply to your business and whether your systems and processes meet those requirements. If gaps appear, we can help bring your business into compliance and provide the security services necessary to stay compliant.

PCI – Payment Card Industry

CIS – Center for Internet Security

ISO 27001 & 27002- International Organization for Standardization

NYDFS – NY Department of Financial Services

HIPAA – Health Insurance Portability and Accountability Act

NIST – National Institute of Standards and Technology

CMMC – Cybersecurity Maturity Model Certification

What it includes:

Security Questionnaire

Interview with NeuralStrikes
Security Expert

Starter Cyber Risk Report and
Recommended Services


Request an in-depth report