"We decided to try the Grant Web security system, after seeing all the news about Sony getting hacked so badly. They scanned our site and found 1 high and 1 medium risk threat. They did a great job of explaining what they were all about and fixed them for a very reasonable price. We are sleeping much better these days knowing our site is 100% secure!"
“Grant Web Services designed and manages our website. They have always been responsive to our questions and concerns and after the SONY hacking attack, it became apparent that perhaps another level of security should be added to our website since patients’ personal, health, and financial information is transmitted through the site. Robert Grant explained what the Grant Web Security System could do for us. They did a security scan and made several suggestions which were implemented to reduce our vulnerability, including adding CAPTCHA to secure our web forms. This work was completed promptly and for a very reasonable fee. Hackers will always be looking for ways to get information, but with the Grant Security System monitoring our website, I do feel we are doing our best to protect our patients.”
Security Risk Assessment Service
With the emergence of Web 2.0, increased information sharing through social networking and increasing business adoption of the Web as a means of doing business and delivering service, websites are often attacked directly. Hackers either seek to compromise the corporate network or the end-users accessing the website by subjecting them to drive-by downloading.
As a result, industry is paying increased attention to the security of the web applications themselves in addition to the security of the underlying computer network and operating systems.
The majority of web application attacks occur through cross-site scripting (XSS) and SQL injection attacks which typically result from flawed coding, and failure to sanitize input to and output from the web application. These are ranked in the 2009 CWESANS Top 25 Most Dangerous Programming Errors.
According the security vendor Cenzic, the top vulnerabilities in March 2012 include:
|4%||Arbitrary code execution|
|4%||Cross-site request forgery|
|3%||Data breach (information disclosure)|
|3%||Arbitrary file inclusion|
|2%||Local file inclusion|
|1%||Remote file inclusion|
NETWORK SCAN - starts at $650.00 BUY NOW
Network scanning is a procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment. Scanning procedures, such as ping sweeps and port scans, return information about which IP addresses map to live hosts that are active on the Internet and what services they offer.
Complete network scan.
Listing all nodes on the network. Their ports and vulnerabilities possibilities.
Targeting a specific matter based on the customer need .. And giving them a result whether it is secured or not.
In Mcla case.. It's their patient info files.
Various pentest attacks against the network.
Evaluating password strengths
Evaluating wireless configuration.
Each network has a different case..
The report will carry as much details as possible.. And recommendations.
Protect users from other users authorized on the network.
Test packet sniffing
Test app spoofing
Test dns spoofing
Once your site is secured, we can then monitor the on-going security health of your Website with either weekly or monthly testing to keep a steady watch on the health of your sites sensitive information.
$65.00 BUY NOW
We can install a numeric code Captcha to run on your Form for a flat fee of $65.00/form.
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
1. used on the web to protect registration and comment forms from spam.
3. Protectings Email Addresses from being captured.
2. If your form is attacked you could get flooded with spam emails.
3. and if you exceed your email allottment per day it would prevent you from receiving your real customers submittal.
4. If your attack continues the domain host might block your sender email or ip.
5. If your email address is blocked or your limit gets exceeded you will go through a hastle with the your Domain host.
6. Prevents Comment Spam in Blogs
7. Protectsng Website Registration
SECURITY CONSULTING SERVICES
Managed Security Services Provider (MSSP), we are your single point of contact for your IT security needs, taking the burden of IT security off your plate so you can focus on your business.