What is a Vulnerability Assessment and Does Your Company Need one?
5,293
Published 2019-09-14
➡️ www.amazon.com/shop/lawrencesystemspcpickup
Gear we used on Kit (affiliate Links)
➡️ kit.co/lawrencesystems
Try ITProTV free of charge and get 30% off!
➡️ go.itpro.tv/lts
Use OfferCode LTSERVICES to get 5% off your order at
➡️ lawrence.video/techsupplydirect
Tesla Referral Program Offer
🚘 www.tesla.com/referral/thomas65092
Lawrence Systems Shirts and Swag
👕 teespring.com/stores/lawrence...
Digital Ocean Offer Code
➡️ m.do.co/c/85de8d181725
HostiFi UniFi Cloud Hosting Service
➡️ hostifi.net/?via=lawrencesystems
Protect you privacy with a VPN from Private Internet Access
➡️ www.privateinternetaccess.com/pages/buy-vpn/LRNSYS
Google Fi Service Referral Code
📱g.co/fi/r/TA02XR
More Of Our Affiliates that help us out and can get you discounts!
➡️ www.lawrencesystems.com/partners-and-affiliates/
🐦 twitter.com/TomLawrenceTech
Patreon
🔗 www.patreon.com/lawrencesystems
Our Forums
🔗 forums.lawrencesystems.com/
GitHub
🔗 github.com/lawrencesystems/
Discord
🔗 discord.gg/ZwTz3Mh
Our Web Site
🔗 www.lawrencesystems.com/
Xaviers YouTube Channel
youtube.com/c/XavierDJohnson
Xaviers Company Site
www.enterpriseoffensivesecurity.com/
Web Application Security Assessment. Penetration Testing, And the Review & Reporting Process
• Web Application Security Assessment. ...
Webinar I did with IT Pro TV
"Don’t be the cause of your customers’ ransomware attack"
go.itpro.tv/msp-ransomware-webinar
All Comments (11)
-
We are currently doing a Cyber Risk Assessment at my work. This is a must do if you intend to take out Cyber Liability insurance at a reasonable price.
-
thanks guys and keep smiling great talk :-) best regards Lance
-
There is a government backed scheme in the UK called CyberEssentials. This is essentially a multi step approach to mitigating risk and the Plus version of CyberEssentials includes an audit. Well worth Googling. Oh and get a free trial of Nessus going, this is a requirement of CyberEssentials to seek out vulnerabilities in operating systems and insecure configurations.
-
More power to you guys! More vídeos no the subject on top of How They got hacked.
-
One the easiest changes we made after assessment was locking down bios on PC’s. Password protect it, not able to boot from usb. I felt dumb for not doing it. Also, I was surprised what programs are passing hashed passwords in the clear.
-
“Of course you need one!” Here is how to order!
-
Dear Tom, i missed the Webinar "Webinar I did with IT Pro TV "Don’t be the cause of your customers’ ransomware attack" is there any way I can see a recording? Thanks!
-
Speaking of vulnerability let me ask you this. We have a system that runs very expensive software and hardware. The vendor of the software states that the systems cannot be patched or have antivirus (interferes with the software). We told them if that's the case the system will obviously not be allowed to be attached to the network. The owner of the system needs for the German company that makes the software to have the capability to remote into the system when needed. The option has been thrown out to have a fully patched system with 2 NIC's, one to the corporate network and the second NIC to unpatched system. This way the fully complient system protects the noncompliant system and allows the vendor to use compliant system as a jump box to get to the noncompliant system. This sounds wrong to me but I can't justify why we shouldn't allow it. Quick risk assessment?
-
Hope all went well with the family and friends last night .
-
Dear Tom, i missed the Webinar "Webinar I did with IT Pro TV "Don’t be the cause of your customers’ ransomware attack" is there any way I can see a recording? Thanks!