Free Cyber Security Assessment How important is it for you to know the condition of your network, your server, your email, your workstations and your backup system?
Our assessment methodology includes:
1) Initial Meeting Here’s how it works: We come to your office and start things off with an initial meeting where we discuss briefly about AITS and what we do. We then interview you and your team and talk all about your likes, dislikes, frustrations, hopes and dreams in terms of your technology.
2) Walk-thru Most of the time, if time permits, we like to have a walkthrough of the location to see the computers and networking environment. This also gives us a chance to talk to the users about their experience with the computers in their day-to-day workings. We find many times the users have had frustrations or issues they have “lived with” for quite some time. These issues cause slowdowns and loss of production and can many times be easily solved.
3) Technical Assessment We collect information about the network such as computer configurations, software, and system usage. Any company data or personal information is untouched. We do not look at data, only at your system design and configuration. Any information we obtain regarding your systems will be treated in a confidential manner.
4) Review After we complete our technical assessment we usually have a brief meeting to discuss any remaining questions anyone may have before we leave.
5) Data Analysis At our office we analyze the data we collected and produce a report of our findings.
6) Report & Briefing A few days after our walkthrough and assessment, we meet with you to discuss our findings. We will identify the strengths and weaknesses of your systems. The results of our findings will be given to you in a comprehensive IT report.
Don’t wait another minute. Schedule your free, no-risk, no-obligation IT assessment by contacting us. A member of the team will be in touch within 24 hours to schedule a convenient time for your Assessment.