‍ringham Security Associates can take an active role in identifying and managing your company’s technology risk.


‍Information Security is a vast field. There are many technical activities that help shape the security posture of your company both before and after a suspected incident.


‍Network Audit - A certified IT Security professional will use specialized hardware and software to:

  • Internal Wi-Fi audit
    • Evaluate the Wi-Fi airwaves from inside the building to look for connected devices
    • Generate a report of every device on your wireless network so you can confirm it matches your expectations
    • Look for hidden networks that may be trying to trap users by snagging poorly configured smartphones
    • Look for “Internet of Things” or other “smart” devices presenting their own networks that can create back doors into your company
  • External Wi-Fi audit
    • Evaluate the Wi-Fi network from outside the premises to understand how far your signal is traveling
    • Look for “evil twin” networks
  • Audit your wired network
    • Scan your physical network to identify all connected devices and what services they might be sharing

‍Implement controls to manage risks

  • Deploy security software and agents
    • Anti-virus, Anti-malware endpoint protection
    • Network monitoring
    • Vulnerability Management scanners and agents
  • Configure multi-factor authentication
    • Authenticator apps
    • Biometrics
    • Security keys
  • Modify configurations of networks and operating systems
    • Remove or disable unused software, services and accounts
    • Configure firewalls and logging
    • Configure timeouts and other security features

‍Investigate suspected security incidents

  • Review logs for unusual activity
    • Firewall logs
    • Operating system logs
    • Physical security logs
  • Inspect devices to find evidence of intrusion
    • Look for hidden files and applications
    • Discover modified configurations
  • Work with third parties to take remedial actions
    • Issue “Take-Down” notices for scam sites
    • Work with engineers from security vendors to upgrade software

Bringham Security Associates, LLC

Morehead City, NC