Data and Security

Information and Security Services

Information Technology and Systems Analysis
We can provide security and compliance analysis for various forms of information distribution technologies, including but not limited to the storage, retrieval, transmission and manipulation of electronic data via computers, computer networks and servers, computer clouds and other telecommunications devices.
• Network Security, Internet Banking, Web Site Controls
We help to set up and/or analyze the provisions and policies that have been put into place for an institution’s network administrator(s) to follow. This includes monitoring and preventing unauthorized access, misuse, modification or denial of a computer network and network-accessible resources. Authorization of access to data in a network is key. Securing the network, as well as protecting and overseeing all operations, is the focus of our work in this area of security analysis.
• Vulnerability Assessments
Vulnerabilities are identified through the use of both internal and external vulnerability reviews and assessment scans. An Internal Vulnerability Assessment performs a complete scan of the internal network, detects all known vulnerabilities and generates a report. An External Vulnerability Assessment analyzes the integrity of perimeter security, validating the firewall configuration to determine if the possibility exists for attacks via the protocols currently allowed through the firewall. These comprehensive reviews then result in recommendations for securing a network, as well as protecting and overseeing the operations being performed.
• GLB Act Compliance
The Gramm-Leach-Bliley Act requires financial institutions to explain their information-sharing practices to their clients and customers, as well as to safeguard sensitive data. We can step in and provide a risk assessment overview and information security program evaluation that will ensure all provisions of the Act are being met and communicated clearly to the customer-base.