SST holds the General Services Administration IT 70 schedule special item number (SIN) Highly Adaptive Cybersecurity Services (HACS). The HACS is combination of the following 5 key services:
Risk Vulnerability Assessment - a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.
Penetration testing - an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system
Incident Response (IR) - is a set of operational instructions designed to help companies prepare for, detect, respond to, and recover from network security incidents. Most IR plans are technology-centric and address issues like malware detection, data theft and service outages.
Cyber Hunt - "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.
High Value Asset Assessment (HVA) - the assessment of information or an information system that is so critical to an organization that the loss or corruption of this information or loss of access to the system would have serious impact to the organization's ability to perform its mission or conduct business
Risk and Vulnerability Assessments
© 2022 SecureSoft Technologies. All rights reserved. Privacy Policy