Six NEW Security Assessment Packages to help you stay ahead of ever changing Cyber Security Threats.

Net X Computers has always been focused on serving you and your staff. We now have SIX more products and even more ways to protect your company.
The Cyber Security frontier is constantly expanding. That is why Net X Computers is proud be be able to offer you range of new assessment packages to help you stay on the forefront of cyber security.
Learn More

Contact Us Today!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

If good things come in three’s...
Then this is fantastic, we have doubled it!

Assessment

As-sess-ment | /əˈsesmənt/

noun: assessment; plural noun: assessments

1: The evaluation or estimation of the nature, quality, or ability of someone or something.

Most companies don’t have the staff, expertise or time to analyze and scrutinize their current IT infrastructure against industry standards. They surely don’t have time to preform regular assessments of all the devices that could possibly put them at risk to a cyber breach or security incident. Net X Computers Security Assessments provide you with multiple options that will fit both your budget and your needs.

Businesses and there security boundaries have grown to include cloud services, virtual computing, mobile devices, and IOT, with this expansion has come increased security risk. Net X Computers brings to the table some of the most experienced Cyber Security Experts in the tech field, we believe strongly in being proactive, not reactive. With our Security Assessments we will help you get ahead of the issues and fix problem before they arise.

Cyber Security Risk Assesment

  • Data Collection
  • Interview
  • Examination
  • Evaluation
  • Findings Report
  • Recommendations

A company will make several configuration changes every year to its firewall and/or router. In most cases, these configuration changes are not scrutinized by a security professional before or after they are made. Over the last 15+ years, Net X Computers has become an expert in all things cyber security.  We use our time and knowledge (black hat tested and white hat approved) to analyze and make recommendations about the current configuration of your firewall.

Above all else, Net X Computers views your cyber security as priority one, even above convenience.  Net X Computers will give you recommendations on cyber security optimizations. We will make sure that your firewall and network are performing at their peak while keeping you protected from the ever changing cyber threats around the world.

HIPAA Risk Assesment

  • Data Collection
  • ePHI Scans
  • Interview
  • Examination
  • Evaluation
  • HIPAA Policies & Procedures
  • Findings Report
  • Recommendations

The first step for any client subject to HIPAA is conducting a comprehensive Risk Assessment to determine whether or not they are in compliance with the regulation and, if not, what needs to be done to ensure they are in compliance. Of course, the Risk Assessment is just the first step and should be the “means” to the end. Your risk assessment is likely to uncover a number of issues that need to be addressed. Some of these issues may be no more difficult than training an employee to update passwords. Others could be much more serious and involved, like changing the data backup and recovery program.

Organizations are not static, nor are their networks or staff. New computers, software, mobile devices, equipment, and files are continually being added and removed from the network over time. Employees come and go, or change positions within the organization. The HIPAA assessment you perform today has a shelf-life. In addition, you should continually be scanning the network for ePHI to prevent a breach.

Network Vulnerability Assesment

  • External Vulnerability Scan
  • Website Vulnerability Scan
  • Examination
  • Evaluation
  • Findings Report
  • Recommendations

We do quality penetration testing much faster and more cost-effective than the traditional approach.  Our consultants achieve this by combining their advanced technical skills with the power of pen-testing tools.  You get an accurate security posture of your web application and office network, then actionable recommendations for improving it.

We combine our own expertise with well-known methodologies such as the OWASP Testing Guide and the Penetration Testing Execution Standard. The tests are performed both manually and automatically and we validate all the findings returned by the security scanners. Depending on the complexity and the time available, we also try to demonstrate the vulnerabilities by providing small proofs-of-concept.

External Penetration Test

  • External Vulnerability Scan
  • Examination
  • Evaluation
  • Exploit Vulnerabilities
  • Findings Report
  • Recommendations

Exploitation makes the difference between a vulnerability assessment and a penetration test. Furthermore, exploitation is necessary to prove the real risk of vulnerability instead of just estimating it. In our pen-tests, we do limited exploitation (time-bound) but enough to understand the risk of vulnerability. For the high-risk issues, you will receive basic Proofs-of-Concept that show how to trigger the vulnerabilities and how basic exploitation can be performed.

Staff Cyber Security Training

  • Data Collection
  • Interview
  • Campaign Design
  • Reporting
  • Training

Inspire cyber security behavior change, Go beyond annual training by inspiring behavioral change and a culture of security. Choose from our library of 700+ resources and pre-built training kits to layer training and keep learners engaged year-round. Assign training with different lengths and styles to match your organization’s culture and deliver relevant content to every member of your organization.

Deliver the right training to the right employees, when it matters most! Educate employees based on their role, security aptitude and preferred learning style. Utilize dynamic groups to personalize education based on lesson retention and deliver training when employees fail assessments, click phishing simulations or trigger security events.

Phishing Awareness Training

  • Data Collection
  • Interview
  • Campaign Design
  • Reporting
  • Training

Engaging security awareness training for employees is an effective way to protect your organization from threats like phishing. Our new security awareness training solution will teach your employees how to detect and avoid malicious content through attention-grabbing training modules and realistic simulations.

Prepare your employees for the most challenging threats they face by simulating the same spoofing techniques, typosquatting and attack types scammers use.

Deliver training the moment your employee clicks a phishing link. Highlight phishing red flags or share educational modules to deliver training in the teachable moment and reinforce good security habits.

We believe in long term relationships, not single transactions. Which is why we have clients for years, not days or months.

At Net X Computers, our mission is this:

To help small and midsized businesses with a secure, cost effective and seamless IT infrastructure that streamlines productivity and efficiency so that it becomes a competitive edge. We have been in business since 2005 and currently protect over 20,000 network connections.