Simply put, a risk assessment assists in identifying events that could adversely impact an organization. Items analyzed include, amount of time need to recover or restore operations and preventative measures to implement to reduce the likelihood or severity of such occurrence.
DWS teams with an organization for a business impact analysis (BIA) before moving into the risk assessment. A portion of the risk assessment may include network mapping, vulnerability scanning, operating system security assessment phishing assessment.
In conjunction with a risk assessment, DWS performs a vulnerability assessment. The tools employed identify and classify security holes in the information network. As new malware is introduced and technology changes, it is imperative an organizations security software and policies are prepared to handle these threats