![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c7030c5f7ca98745b1e0e_642b733b95612b72e78497fb_pci.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c703098963e76ac46cb03_642b7363801425008f957f50_ccnp%20(1).png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/65ce1f2d8e66ceb65a66fcb0_Lenovo_logo_2015.svg%20(1).png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c70303901bdfa261c5356_642b70a1801425ae639545c7_chef-logo%20(1).png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c702f935f98005ead1b30_642b73095203807a2e2316f0_crisc%20(1).png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c702f5941a729df55fde9_642b726e93e6533849bc111d_Certified_Information_Systems_Security_Professional_logo.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c702f3fbfbf7a080d7b48_642b72bdea06760921026f45_ceh%20(1).png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/65ce1f4f1ef96e0729920e4b_cropped-Copy-of-CURRENT-BPT-Logo-All-New-01.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c7606b2518cf8128967cf_Terraform_Logo.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c7638a30f889d89d32108_Asset-Red_Hat-Logo_page-Logo-RGB.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c73239bc4f3d4b89dba12_rancher-suse-logo-horizontal-color.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/642c72d4b14a8a3e1fa731ed_NetApp_logo_2020.svg.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/65ce1f9b91ea872fdce59fc1_coresite-oneline-logo-rgb.png)
![](https://cdn.prod.website-files.com/641c5f810de1f38c334c0a99/65ce1fbeab5387bf85773d1b_Microsoft_logo_(2012).svg.png)
Leverage a comprehensive set of assessment services to ensure you know exactly where you stand as a business
Our ApProach
Specializations
HIPAA Risk Assessment:
- Determine how exposed your PHI & ePHI data is and how to mitigate your risks.
Risk Assessment:
- Understand and prioritize your residual risk with practical mitigation recommendations.
IT Security Gap Assessment:
- Evaluate your ability to preserve the Confidentiality, Integrity and Availability of critical information.
CIS Top 20 Critical Security Controls Solutions:
- A prioritized set of best practices created to stop the most pervasive and dangerous threats of today.
Penetration Testing
- Identify real world risks to your organization with ethical hacking and social engineering
IT Security Gap Assessment
IT Security Risk Assessment Process
- STN reviews several sets of process controls, technology controls, and physical security controls.
Administrative Controls
- Reviewing policy, procedures, disaster recovery, business continuity, critical vendors, operations, information security, risk assessment, and regulatory compliance.
External Technical Controls
- Analyzing firewall configurations, internet design, exposed services and border devices, internet servers, intrusion detection/prevention systems, and remote access.
Internal Technical Controls
- Test performed to identify vulnerabilities on the WAN, LAN, Voice system, internal servers/printers, wireless networks, modems, vendor and partner connectivity, logging analysis and report, data-in-transit and portable devices.
Wireless Controls Review
- Identify wireless coverage overreach into non-private areas, identify weaknesses in wireless technical controls, analyze wireless network architecture, search for rogue access points and analyze wireless security configurations.
Risk Assessment
Social Engineering:
- Test your employee’s ability to resist social engineered attacks, impersonation, and manipulation.
Managed Vulnerability Scanning:
- Internal, External, and PCI-ASV vulnerability scanning with a personalized review by our security analysts.
Penetration Testing:
- Infrastructure, Application, and Mobile penetration testing prioritizing vulnerabilities discovered and recommendations for remediation.
STN Portal
- Access a secure dashboard to track all projects, security assessments, and service tickets.
Social Engineering
Email Phishing
- STN’s Email Phishing Service customizes emails specifically targeting individuals at your company.
USB Attack
- STN tests a scenario in which auto-run USB drives containing a simulated malicious program runs when the drive is plugged into a user’s computer.
Phone Phishing
- STN’s Phone Phishing Service tests your employees’ compliance with policy prohibiting surveys and to obtain password policy information or passwords.
On-Site Impersonation
- STN Security Consultants masquerade as a third party vendors or employees to obtain unauthorized access or acquire confidential information.
Tools and Planning
Cybersecurity Assessment Tool
- Automate your FFIEC CAT self-assessment.
Incident Response Planning:
- Develop and rigorously test your Incident Response Plan.
IT Security Gap Assessment:
- The CAT self-assessment software is built to be intuitive and walk you and your team through the assessment.
Schedule Your Risk-Free Consultation
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.