Find out where you stand with our holistic, in-depth enterprise security assessments. This provides you with an unbiased third party validation, an assessment of your security posture, and prioritization of your needs.

See Details

Primarily focused on your internal IT data security and technical vulnerabilities, the NSA is an unbiased, in-depth assessment of your security controls  –  this is what most people believe is where cyber security begins and ends.

See Details

A penetration (or "pen") test occurs when ethical or White Hat hackers simulate an attack on your applications, databases, websites, servers, network devices, and computers.  A pen test determines the feasibility of an attack, the possible impact that attack would have, and the cost of a successful exploit.

See Details

Every business has risks to critical applications that could lead to potential downtime and lost productivity. Our team does the heavy lifting that is required for the creation of a comprehensive BCDR plan. 

See Details

HAVE QUESTIONS?

Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments. In the rush to keep your users happy sometimes things get missed, forgotten or overlooked – a mistake in this section of cyber security could be disastrous.

Get more info

Social engineering is a subset of penetration testing that focuses on identifying and validating vulnerabilities associated with your employees' ability to follow documented policies and procedures and security best practices.

See Details

Be prepared for security audits. Meet or exceed compliance and regulatory requirements of industry or government standards for data security. Spohn Consulting provides gap analysis, audits, and reports on compliance.

  • HIPAA
  • FFIEC
  • NCUA
  • NIST 800-53, FDCC
  • SOX, GLBA, SAS-70

See more details

Formal Network or Data Security Policies are a part of most regulatory compliance audits including NERC, HIPAA, PCI and HITECH. These policies are frequently overlooked, simply inadequate or worse yet violate security best practices.  

Our experts can help you evaluate or craft policies that will meet or exceed regulatory compliance for Security Training to HR Personnel to Change Management Policy.

Get more information

This is one of our key strengths and core competencies.  We are experts at evaluating your policies, procedures and security practices against HIPAA Security and Privacy Rules. Spohn delivers the results in a professional document package crafted by the same professional auditor that performed the scans, reviewed your policies, assessed your system configurations, and interviewed your personnel.

See more details

For any Health Care provider wanting to receive the incentives or avoid penalties, the only option is to increase compliance. To receive the incentive funds available through the provisions of the HITECH Act – you must meet all Meaningful Use provisions by specific dates.

External References:

See more details

<!--
Whether evaluating a complex enterprise, a single web portal or conducting an information technology audit our expert certified consultants will reveal the flaws known to hackers and criminals and provide you with guidelines for remediation.

Enterprise Security Assessment
An ESA – Enterprise Security Assessment provides a complete end to end cyber security audit. Get the highest level of data security economically possible for you assessed risk level

Spohon provides enterprise solutions for:

  • detailed inspection
  • analysis
  • reporting of the security controls

-->

<!--

Network Security Audit
A NSA – Network Security Audit is an Internal IT data security assessment focuses primarily on technical vulnerabilities. The NSA is an unbiased, in-depth assessment of your technical data security controls  –  this is what most people believe is where cyber security begins and ends.

Perimeter Security Assessment

A PSA is an External IT Data Security Assessment giving you detailed information about the state of perimeter security, the way a hacker would see it.

Firewall Data Security Reviews

Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments. In the rush to keep your users happy sometimes things get missed, forgotten or overlooked – a mistake in this section of cyber security could be disastrous.

Social Engineering Testing

SE Pen testing is a subset of penetration testing that focuses on identifying and validating vulnerabilities associated with your employee's ability to follow documented policies and procedures and security best practices.

Data Security Compliance

Be prepared for security audits. Meet or exceed compliance and regulatory requirements of industry or government standards for data security. Spohn Consulting provides gap analysis, audits, and reports on compliance.

  • HIPAA
  • FFIEC
  • NCUA
  • NIST 800-53, FDCC
  • SOX, GLBA, SAS-70

Security Policy Documentation

Formal Network or Data Security Policies are a part of most regulatory compliance audits including NERC, HIPAA, PCI and HITECH. These policies are frequently overlooked, simply inadequate or worse yet violate security best practices.  

Our experts can help you evaluate or craft policies that will meet or exceed regulatory compliance for Security Training to HR Personnel to Change Management Policy.

HIPAA Audits

This is one of our key strengths and core competencies.  We are experts at evaluating your policies, procedures and security practices against HIPAA Security and Privacy Rules. Spohn delivers the results in a professional document package crafted by the same professional auditor that performed the scans, reviewed your policies, assessed your system configurations and interviewed your personnel.

HITECH Audits

HITECH regulations make audits necessity for all healthcare providers and their partners or BAAs – a simple letter or memorandum with no longer suffice and ignorance is no longer an option…Along with the new incentive funds came stiff penalties.

External References:

 

 
-->

We provide custom solutions to everyone from Fortune 500 companies to rural hospitals.

Get a Quote