{"id":12919,"date":"2021-04-02T18:48:54","date_gmt":"2021-04-02T23:48:54","guid":{"rendered":"http:\/\/45.33.92.219\/?p=12919"},"modified":"2021-04-02T18:48:54","modified_gmt":"2021-04-02T23:48:54","slug":"should-we-be-performing-a-network-security-scan","status":"publish","type":"post","link":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/","title":{"rendered":"Should We Be Performing A Network Security Scan?"},"content":{"rendered":"<h5 style=\"text-align: center;\">Should We Be Performing A Network Security Scan?<\/h5>\n<p><strong>By: <span class=\"TextRun SCXW87123199 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW87123199 BCX0\">Bruce G. Kreeger<\/span><\/span><\/strong><\/p>\n<div style=\"text-align: justify;\">\n<p>A network security audit helps to determine the effectiveness of network security in resolving underlying network security issues. Network security audits are critical to understanding how well your organization is protected against security threats, whether internal or external. A network security audit is part of an overall information systems audit framework and includes application software audit, operation system audit, and business audit.<\/p>\n<p>The network security audit must be reviewed in two aspects. The first aspect being static data, such as protocols used, system definitions, password rules, firewall definitions, and the like, whereas the second aspect of this kind of data security software deals with the activities that have taken place. Modifications of files, transfer of files, access to databases, and when and where users log on are just some of the more common items viewed in the network security audit.<\/p>\n<p>At Clarity, our Security Audits are based on industry-accepted standards\u202fsuch as BS7799:<\/p>\n<p>1. BS7799 was a standard originally published by\u202fBSI Group\u202f(BSI)\u202f[1]in 1995. It was written by the\u202fUnited Kingdom\u202fGovernment\u2019s Department of Trade and Industry (DTI) and consisted of several parts. The first part, containing the best practices for Information Security Management, was revised in 1998; after a lengthy discussion in the worldwide standards bodies, it was eventually adopted by\u202fISO\u202fas\u202fISO\/IEC 17799, \u201cInformation Technology &#8211; Code of practice for information security management.\u201d in 2000.\u202fISO\/IEC 17799\u202fwas then revised in June 2005 and finally incorporated in the ISO 27000 series of standards as\u202fISO\/IEC 27002\u202fin July 2007. BSI first published the second part to BS 7799 in 1999, known as\u202fBS 7799 Part 2, titled \u201cInformation Security Management Systems &#8211; Specification with guidance for use.\u201d BS 7799-2 focused on how to implement an\u202finformation security management system\u202f(ISMS), referring to the information security management structure and controls identified in BS 7799-2, which later became\u202fISO\/IEC 27001. The 2002 version of BS 7799-2 introduced the Plan-Do-Check-Act (PDCA) (Deming quality assurance model), aligning it with quality standards such as\u202fISO 9000. BS 7799 Part 2 was adopted by ISO as\u202fISO\/IEC 27001\u202fin November 2005. BS 7799 Part 3\u202fwas published in 2005, covering risk analysis and management. It aligns with ISO\/IEC 27001.<\/p>\n<p>We also follow CoBIT:<\/p>\n<p>2. COBIT (Control Objectives for Information and Related Technologies) is a\u202fframework\u202fcreated by\u202fISACA\u202ffor\u202finformation technology (IT) management\u202fand\u202fIT governance.\u202f[1]<\/p>\n<p>The framework defines a set of generic processes for IT management, with each method defined together with process inputs and outputs, key process-activities, process objectives, performance measures, and an elementary\u202fmaturity model.[1]<\/p>\n<p>3. We adhere to legal requirements specific to the industry and country. The auditing approach is designed to cover all security aspects, including People, Processes, and Technology. Our consultants are certified professionals with all the relevant security certifications such as CISSP, CISA, ISO 27001.<\/p>\n<p>4. Clarity\u2019s primary compliance model is based on an ISO2701\/IEC compliant Network Security Scan.<\/p>\n<p>Clarity\u2019s Audit Process bases the audit on the nature of data handled by the network and the level and extent of security required, as specified by the overall corporate network security policy.<\/p>\n<p>The audit process entails a thorough review of the network, including the system architecture, the use of software and hardware, the relevance of the tools used to perform specific actions, the connections to external networks, access control and privileges for users, the nature of checks and balances in place, and more.<\/p>\n<p>A periodic network security audit is indispensable for the smooth and seamless functioning of networks. In an increasingly connected world, where businesses\u2019 very existence depends on real-time interactions with suppliers, customers, and others, this becomes a fundamental exercise to protect business-critical information<\/p>\n<p><strong>Clarity is proud to have been providing Network Security\u202fServices, including Network Security Assessments and Firewall Systems\u202f, to the Americas\u202ffor many\u202fyears\u202f,\u202fincluding clients\u202fWorldwide offering our unified communications platform. Clarity Technologies Group, LLC surpasses expectations. <\/strong><\/p>\n<p style=\"text-align: center;\"><strong><img decoding=\"async\" class=\"alignnone size-full wp-image-9326\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg\" alt=\"\" width=\"300\" height=\"116\" \/><img decoding=\"async\" class=\"alignnone wp-image-9425\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/PNG-275x300.png\" alt=\"\" width=\"125\" height=\"136\" \/>\u00a0<\/strong><\/p>\n<p><strong>Call Clarity at 800-354-4160 today or email us at <a href=\"mailto:info@clarityscg.com\">info@clarityscg.com<\/a>. We are partnered internationally around the globe and we are open seven days a week 8:30 AM to 5:00 PM EST\/EDT. <a href=\"http:\/\/45.33.92.219\">http:\/\/45.33.92.219<\/a> and <a href=\"https:\/\/dotmantech.com\">https:\/\/dotmantech.com<\/a>.<\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Should We Be Performing A Network Security Scan? By: Bruce G. Kreeger A network security audit helps to determine the effectiveness of network security in resolving underlying network security issues. Network security audits are critical to understanding how well your organization is protected against security threats, whether internal or external. A network security audit is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-12919","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Should We Be Performing A Network Security Scan? -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should We Be Performing A Network Security Scan? -\" \/>\n<meta property=\"og:description\" content=\"Should We Be Performing A Network Security Scan? By: Bruce G. Kreeger A network security audit helps to determine the effectiveness of network security in resolving underlying network security issues. Network security audits are critical to understanding how well your organization is protected against security threats, whether internal or external. A network security audit is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-02T23:48:54+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg\" \/>\n<meta name=\"author\" content=\"Bruce Kreeger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Kreeger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/\"},\"author\":{\"name\":\"Bruce Kreeger\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"headline\":\"Should We Be Performing A Network Security Scan?\",\"datePublished\":\"2021-04-02T23:48:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/\"},\"wordCount\":686,\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/\",\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/\",\"name\":\"Should We Be Performing A Network Security Scan? -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\",\"datePublished\":\"2021-04-02T23:48:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#primaryimage\",\"url\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\",\"contentUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/02\\\/should-we-be-performing-a-network-security-scan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/claritytg.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Should We Be Performing A Network Security Scan?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\",\"url\":\"https:\\\/\\\/claritytg.com\\\/\",\"name\":\"\",\"description\":\"Your Solutions Provider\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/claritytg.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\",\"name\":\"Bruce Kreeger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"caption\":\"Bruce Kreeger\"},\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/author\\\/bruec-kreeger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Should We Be Performing A Network Security Scan? -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/","og_locale":"en_US","og_type":"article","og_title":"Should We Be Performing A Network Security Scan? -","og_description":"Should We Be Performing A Network Security Scan? By: Bruce G. Kreeger A network security audit helps to determine the effectiveness of network security in resolving underlying network security issues. Network security audits are critical to understanding how well your organization is protected against security threats, whether internal or external. A network security audit is [&hellip;]","og_url":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/","article_published_time":"2021-04-02T23:48:54+00:00","og_image":[{"url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","type":"","width":"","height":""}],"author":"Bruce Kreeger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Kreeger","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#article","isPartOf":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/"},"author":{"name":"Bruce Kreeger","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"headline":"Should We Be Performing A Network Security Scan?","datePublished":"2021-04-02T23:48:54+00:00","mainEntityOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/"},"wordCount":686,"image":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/","url":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/","name":"Should We Be Performing A Network Security Scan? -","isPartOf":{"@id":"https:\/\/claritytg.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#primaryimage"},"image":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","datePublished":"2021-04-02T23:48:54+00:00","author":{"@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"breadcrumb":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#primaryimage","url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","contentUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/02\/should-we-be-performing-a-network-security-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/claritytg.com\/"},{"@type":"ListItem","position":2,"name":"Should We Be Performing A Network Security Scan?"}]},{"@type":"WebSite","@id":"https:\/\/claritytg.com\/#website","url":"https:\/\/claritytg.com\/","name":"","description":"Your Solutions Provider","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/claritytg.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a","name":"Bruce Kreeger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","caption":"Bruce Kreeger"},"url":"https:\/\/claritytg.com\/index.php\/author\/bruec-kreeger\/"}]}},"_links":{"self":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/12919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/comments?post=12919"}],"version-history":[{"count":0,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/12919\/revisions"}],"wp:attachment":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/media?parent=12919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/categories?post=12919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/tags?post=12919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}