Penetration Testing

Penetration testing is a cybersecurity best practice that helps ensure that IT environments are properly secured and vulnerabilities are appropriately patched. A penetration test seeks to determine whether and how a malicious user can gain unauthorized access to information assets. For over a decade TrustNet has performed penetration tests to help organizations uncover hidden security vulnerabilities. Our proven methodology provides actionable steps for ensuing the security of your systems.

TrustNavigator™ Penetration Testing Approach

Our best-practices methodology has been fine-tuned over decades through thousands of hours of experience.

Cybersecurity Risk Assessments

In a world of rapidly growing cybersecurity threats understanding and evaluating risk means smarter decision-making in business. IT systems face inherent risks, no matter the size of the environment. These inherent risks must be mitigated, but knowing where to focus can be a challenge.
Risk Assessments assist in defining the current security conditions so that management can make informed decisions and appropriate investments. Risk-based decisions are the basis of almost every compliance standard. Once you have perspective on your risks, you can adapt your security program, deploy the appropriate technology, and better plan future investments. Our assessments include validation of the three pillars of Information Security: Confidentiality, Integrity, and Availability. The output of this process is intended to provide management a roadmap of potential security gaps and detailed technical recommendations to apply additional controls to mitigate risks.

Cybersecurity Risk Assessment Methodology

Asset Identification
Hardware, Software, Data, and People
Threat Identification
Threat History, Intelligence Agencies, Security Media
Vulnerability Identification
Security Testing
Risk Assessment
Likelihood Determination, Impact Analysis, Risk Determination
Reporting
Executive Summary and Detailed Risk Assessment Report

Security Awareness Training Solutions

TrustNet provides security awareness training services that address the human element of your security environment. Our extensive range of courses and up to date content ensure that users understand their role in security and compliance and can put this knowledge into practice.
Our training offerings aim to accomplish several goals, including:
  • Empowering users so they understand security best-practices
  • Provide instructor-led and computer-based options, so users can learn anytime and anywhere
  • Educating employees on compliance rules and regulations, for example PCI and HIPAA
  • Instilling a culture of accountability
Our offering includes:
  • Online Security Awareness Training
  • Instructor-led classes with direct access to subject matter experts
  • Continuous awareness communication programs
  • Security awareness posters and screen savers

e-Learning Security Awareness Course Description

Courses are available in US English, UK English, Spanish, Arabic, and Hindi. Customized courses and additional language translations available.
LEVEL 1
Course Description Quiz Voice Over
In depth coverage of content At least two quizzes Yes
Module Name: Security Awareness Training – US English Security Awareness Training – UK English Security Awareness Training – Spanish *New* Security Awareness Training – Arabic *New* Security Awareness Training – Hindi *New* Social Engineering User Awareness Training Developer Awareness Training *New*
LEVEL 2
Course Description Quiz Voice Over
Detailed content At least two quizzes Yes
Module Name: Payment Card Security Securing Company Financials EU Privacy US Privacy Privacy of Personal Healthcare Information Social Engineering for Social Networks *New*
LEVEL 3
Course Description Quiz Voice Over
Brief overview of material At least one quiz No
Module Name: Handling Payment Cards Hacking, Cracking, & Cyber-Crime Mobile Phone Security Security at Home Identity Theft Online Security at Home Phishing Website Security Malicious Software Wireless “Wi-Fi” Security Using Good Passwords Travel Security Handling Payment Cards for Call Centers *New* Working with Outside Companies *New* E-Mail Security *New* Working Remotely *New* Handling Company Information *New* Data Encryption *New* Laptop Security *New* Backing Up Your Data *New* Business Continuity *New* Data Retention *New* Privacy *New* Remote Access *New* Social Engineering *New* Social Networking *New* Working Remotely *New*

Incident Response

TrustNet’s Incident Response team provide proactive and reactive services to mitigate unauthorized and unintended exposure of confidential data. We leverage decades of experience, proprietary technology, and leading investigative techniques. Our process is designed to identify compromised assets, stop on-going contagion, identify the scope of the breach, and return the network to normal operating condition.
R

Planning and Analysis

R

Incident Reponses Readiness Testing

R

Incident Management

R

Incident Response Retainer Services

TrustNavigator™ Incident Response Approach

Our best-practices methodology has been fine-tuned over decades through thousands of hours of experience.

Cloud

Security is at the forefront of any cloud deployment. The added risk of cloud environments can be a significant burden to the enterprise. No matter the size of your organization designing your cloud with security from the start will better protect your environment and reduce your overall risk exposure.
Our cloud services include:
  • Strategy and Architecture
  • Risk Assessments
  • Secure Your Applications and Data
  • Test Your Cloud Security
  • Manage Compliance