Charlottesville

(434) 979-0555

Richmond

(804) 806-3457

NWG Recon Report

A comprehensive, non-invasive technology scan to identify vulnerabilities in your IT system.

Contact us at

(434) 979-0555

and let

NWG RECON REPORT

IDENTIFY HOLES IN YOUR NETWORK ARMOR.

NWG RECON REPORT

FORTIFY YOUR BUSINESS WITH NWG RECON REPORT

HOW IT WORKS

NWG RECON REPORT is a security snapshot that identifies vulnerabilities in your IT armor. Each assessment evaluates the security of your network at that moment in time and can be conducted from yearly to quarterly, depending on your business needs.

At the heart of our RECON REPORT is a comprehensive yet non-invasive technology scan: Our software searches your data without disrupting network performance. Depending on your requirements, our expert consultants can walk you through the analysis giving you the information necessary to safeguard your business.

Why it matters

  • Staff productivity. Without a healthy server, you lose the performance of business critical applications like EMRs, Quickbooks, and Microsoft Dynamics. Users can also lose access to heavy files like art and CAD drawings.
  • Data security. When your server’s software falls out of date with Microsoft security patches it becomes vulnerable to cyber attacks in just 30 days. All of your data may be compromised and hackers can perch on your server to launch attacks on other people.
  • Your cost to serve. When your server’s hardware degrades it sends alerts of predicted failure. Without a monitoring system to catch these alerts, your hard drive can crash, costing you the salary and lost revenue of workday downtime (instead of an after hours fix).

How you’ll benefit

  • Peace of mind. If your business falls prey to exploitation by hackers, they can steal your identity, delete your data, encrypt your backups, and sell your information on the dark web. Protect against panic and potential liability by identifying your vulnerabilities upfront.
  • Disaster prevention. 9 out of 10 computer networks have potentially dangerous problems sitting undetected. By proactively investigating your IT system, you have the insight to spot weaknesses and protect against technological disaster.

Get precise, powerful insights by choosing the right assessment for you.
Choose the option that fits your needs and your internal IT proficiency.

RECON REPORT REMOTE

Network assessment technology scan

  • Document the domain policies, security groups and network shares
  • Evaluate all security accounts and passwords
  • Review patch and antivirus on computers
  • Identify major applications installed
  • Check for external security vulnerabilities
  • Internet access, speed and domain details
  • Recent event log analysis
  • List all PC’s servers, printers, peripherals and network devices

Security assessment technology scan

  • Historical network login details
  • Inbound/outbound protocol review
  • Wireless network access review
  • Security management plan
  • Comprehensive domain policy review
  • Detailed share permissions

Provided reports, emailed in PDF format

  • Network assessment
  • Security assessment
  • Security risk report

RECON REPORT CORE

Everything in RECON REPORT REMOTE, plus:

Onsite physical security review

  • Rogue network device survey
  • Document office perimeter security
  • Review server, workstation and network device security
  • Insecure removable media review
  • Document alarm, fire, intrusion, camera systems
  • Note sign in/out process, and badge usage
  • Note use of IT policy, DR and BC documents

Provided reports, printed and bound, email PDF format

  • Data breach liability
  • Consolidated management plan
  • Security risk summary
  • Executive summary

Onsite review session with client

  • Discuss results summary
  • Risk appraisal
  • Review recommended changes
  • Improvement expectations

RECON REPORT COMPLIANCE

Everything in RECON REPORT CORE plus:

Security assessment technology scan

  • HIPAA risk assessment technology scan
  • System activity review
  • Password management
  •  ePHI risk file scan
  •  Disk encryption detection
  •  Protection from malicious software
  •  Security patch assessment
  •  Domain administrator review
  •  Firewall/router feature analysis

Onsite physical security review

  • Rogue network device survey
  • Document office perimeter security
  • Review server, workstation and network device security
  • Insecure removable media review
  • Document alarm, fire, intrusion, camera systems
  • Note sign in/out process, and badge usage
  • Note use of IT policy, DR and BC documents

HIPAA onsite survey questionnaire

  • Access security measures
  • Multi-factor authentication
  • Viewable screens review
  • EHR systems location
  • Retired/decommissioned/failed systems

Provided reports, printed and bound, email PDF format

  • Network assessment changes*
  • Security risk assessment changes*
  • Evidence of HIPAA compliance
  • HIPAA compliance PowerPoint®
  • HIPAA management plan
  • HIPAA policy and procedures
  • HIPAA risk analysis
  • Security exception worksheet
  • Onsite HIPAA security review
  • Drive encryption
  • ePHI scans
  • Quarterly business review

* Only apply with the recurring subscription option.