So when we look at the vulnerabilities and threats, we determine what dangers an asset may face. Both a threat and a vulnerability must be present in order for them to be a “risk” to your organization. What is the likelihood that the vulnerability would be exploited? What would happen to your organization if the attack occurred? We assign likelihood and impact ratings for the risk. Then we score your total risk with a “risk rating.”
(TECHIE STUFF: We use the well-known equation Risk = Threat x Vulnerability.)
We repeat our assessment after every change to your networks and systems, and at the end of every quarter. As an objective 3rd party, we also may find risks our clients overlooked and perform official security compliance audits as well.