Security Assessments

Identify and evaluate if your Company is at Risk and Vulnerable to Cyber Attacks and Security Breaches.

Leverage a comprehensive set of assessment services to ensure you know exactly where you stand as a business

Our ApProach


HIPAA Risk Assessment:

  • Determine how exposed your PHI & ePHI data is and how to mitigate your risks.

Risk Assessment:

  • Understand and prioritize your residual risk with practical mitigation recommendations.

IT Security Gap Assessment:

  • Evaluate your ability to preserve the Confidentiality, Integrity and Availability of critical information.

CIS Top 20 Critical Security Controls Solutions:

  • A prioritized set of best practices created to stop the most pervasive and dangerous threats of today.

Penetration Testing

  • Identify real world risks to your organization with ethical hacking and social engineering

IT Security Gap Assessment

IT Security Risk Assessment Process

  • STN reviews several sets of process controls, technology controls, and physical security controls.

Administrative Controls

  • Reviewing policy, procedures, disaster recovery, business continuity, critical vendors, operations, information security, risk assessment, and regulatory compliance.

External Technical Controls

  • Analyzing firewall configurations, internet design, exposed services and border devices, internet servers, intrusion detection/prevention systems, and remote access.

Internal Technical Controls

  • Test performed to identify vulnerabilities on the WAN, LAN, Voice system, internal servers/printers, wireless networks, modems, vendor and partner connectivity, logging analysis and report, data-in-transit and portable devices.

Wireless Controls Review

  • Identify wireless coverage overreach into non-private areas, identify weaknesses in wireless technical controls, analyze wireless network architecture, search for rogue access points and analyze wireless security configurations.

Risk Assessment

Social Engineering:

  • Test your employee’s ability to resist social engineered attacks, impersonation, and manipulation.

Managed Vulnerability Scanning:

  • Internal, External, and PCI-ASV vulnerability scanning with a personalized review by our security analysts.

Penetration Testing:

  • Infrastructure, Application, and Mobile penetration testing prioritizing vulnerabilities discovered and recommendations for remediation.

STN Portal

  • Access a secure dashboard to track all projects, security assessments, and service tickets.

Social Engineering

Email Phishing

  • STN’s Email Phishing Service customizes emails specifically targeting individuals at your company.

USB Attack

  • STN tests a scenario in which auto-run USB drives containing a simulated malicious program runs when the drive is plugged into a user’s computer.

Phone Phishing

  • STN’s Phone Phishing Service tests your employees’ compliance with policy prohibiting surveys and to obtain password policy information or passwords.

On-Site Impersonation

  • STN Security Consultants masquerade as a third party vendors or employees to obtain unauthorized access or acquire confidential information.

Tools and Planning

Cybersecurity Assessment Tool

  • Automate your FFIEC CAT self-assessment.

Incident Response Planning:

  • Develop and rigorously test your Incident Response Plan.

IT Security Gap Assessment:

  • The CAT self-assessment software is built to be intuitive and walk you and your team through the assessment.

Schedule Your Risk-Free Consultation

Full name*


I'm interested in...*

Project Description*

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.