Find out where you stand with our holistic, in-depth enterprise security assessments. This provides you with an unbiased third party validation, an assessment of your security posture, and prioritization of your needs.

See Details

Primarily focused on your internal IT data security and technical vulnerabilities, the NSA is an unbiased, in-depth assessment of your security controls  –  this is what most people believe is where cyber security begins and ends.

See Details

A penetration (or "pen") test occurs when ethical or White Hat hackers simulate an attack on your applications, databases, websites, servers, network devices, and computers.  A pen test determines the feasibility of an attack, the possible impact that attack would have, and the cost of a successful exploit.

See Details

Every business has risks to critical applications that could lead to potential downtime and lost productivity. Our team does the heavy lifting that is required for the creation of a comprehensive BCDR plan. 

See Details

HAVE QUESTIONS?

Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments. In the rush to keep your users happy sometimes things get missed, forgotten or overlooked – a mistake in this section of cyber security could be disastrous.

Get more info

Social engineering is a subset of penetration testing that focuses on identifying and validating vulnerabilities associated with your employees' ability to follow documented policies and procedures and security best practices.

See Details

Be prepared for security audits. Meet or exceed compliance and regulatory requirements of industry or government standards for data security. Spohn Consulting provides gap analysis, audits, and reports on compliance.

  • HIPAA
  • FFIEC
  • NCUA
  • NIST 800-53, FDCC
  • SOX, GLBA, SAS-70

See more details

Formal Network or Data Security Policies are a part of most regulatory compliance audits including NERC, HIPAA, PCI and HITECH. These policies are frequently overlooked, simply inadequate or worse yet violate security best practices.  

Our experts can help you evaluate or craft policies that will meet or exceed regulatory compliance for Security Training to HR Personnel to Change Management Policy.

Get more information

This is one of our key strengths and core competencies.  We are experts at evaluating your policies, procedures and security practices against HIPAA Security and Privacy Rules. Spohn delivers the results in a professional document package crafted by the same professional auditor that performed the scans, reviewed your policies, assessed your system configurations, and interviewed your personnel.

See more details

For any Health Care provider wanting to receive the incentives or avoid penalties, the only option is to increase compliance. To receive the incentive funds available through the provisions of the HITECH Act – you must meet all Meaningful Use provisions by specific dates.

External References:

See more details

We provide custom solutions to everyone from Fortune 500 companies to rural hospitals.

Get a Quote