Security Assessment

Security Assessment

Most security incidents trace back to misconfigurations, stale credentials, unpatched systems, and access controls that were never properly set up or reviewed. We perform structured security assessments using industry tools β€” including Tenable for vulnerability scanning, SentinelOne for endpoint analysis, and Stellar Cyber for cross-environment visibility β€” to identify exactly where your business is exposed and what to fix first.

DK’s Enterprises has delivered security and IT services since 1999. We assess environments for businesses across NYC (all 5 boroughs), Nassau County, Long Island, and Northern New Jersey β€” including Essex, Hudson, Union, and Middlesex counties.

IT professional monitoring business systems, network performance, and managed IT infrastructure

Our only office location: 159 Doughty Blvd, Suite 1, Inwood, NY 11096.

What We Actually Check

Having antivirus or a firewall does not mean your environment is secure. Configuration quality, access hygiene, and patch discipline matter more than the tools themselves. Our assessment examines the areas where real breaches happen:

  • Active Directory and identity: admin accounts, group policy settings, password policies, stale accounts, privilege escalation paths
  • Multi-factor authentication: MFA coverage across Microsoft 365, VPN, RDP, and admin portals β€” including gaps in conditional access policies
  • Endpoint security posture: SentinelOne or existing EDR agent status, policy enforcement, detection rule updates, and device compliance
  • Vulnerability scan results: Tenable-based scanning of internal and external assets β€” CVE severity scoring, missing patches, exposed services
  • Firewall and perimeter: Fortinet or existing firewall rule review β€” unused rules, overly permissive policies, VPN configuration, NAT exposure
  • Microsoft 365 security: Secure Score review, mailbox forwarding rules, app permissions, SharePoint/OneDrive sharing policies, audit logging status
  • Backup security: access segregation, retention policies, immutability settings, recovery test records

How the Assessment Works

We follow a consistent 4-phase process aligned with NIST Cybersecurity Framework and CIS Controls principles:

  1. Scoping and access. We define what systems, accounts, and network segments are in scope. You provide temporary read-only access or credentials β€” no agents are permanently installed during assessment.
  2. Technical review. We run vulnerability scans (Tenable), review endpoint protection status (SentinelOne/Huntress), audit Active Directory, examine firewall rules (Fortinet/Cisco), and check M365 configuration. This typically takes 3–5 business days depending on environment size.
  3. Analysis and prioritization. Findings are scored by severity and business impact β€” not every vulnerability is critical, and we separate the urgent from the routine so you can focus budget where it matters.
  4. Report and walkthrough. You receive a written report with specific findings, affected systems, severity levels, and recommended fixes. We walk through the report with your team and answer questions before any work begins.

Common Findings We Uncover

After completing over 2,500 IT projects since 1999, we consistently see the same categories of risk β€” even in organizations that believe they are well-protected:

  • Domain admin accounts used for daily work β€” a single compromised credential gives full network control
  • MFA disabled on admin portals or VPN β€” often the entry point for ransomware attacks
  • Firewalls with “allow all” outbound rules β€” malware exfiltrates data undetected
  • Unpatched Windows servers running critical services β€” known CVEs with public exploits available
  • Microsoft 365 mailbox forwarding rules to external addresses β€” active or dormant compromises
  • Backup credentials stored on the same domain β€” ransomware encrypts backups along with production data
  • Endpoint protection installed but not reporting or updating β€” no visibility when agents silently fail
  • Legacy systems (Server 2012, Windows 10 EOL) on flat networks β€” no segmentation isolating vulnerable machines

If any of these sound familiar, an assessment will quantify the actual risk and show you what to fix first.

When You Should Run an Assessment

  • After a security incident or close call β€” phishing success, unauthorized access, ransomware attempt
  • Before or after infrastructure changes β€” server migration, firewall replacement, cloud adoption
  • During compliance preparation β€” HIPAA, PCI-DSS, NIST 800-171, or cyber insurance applications
  • After IT staff turnover β€” verifying what previous admins configured and what they left behind
  • When switching IT providers β€” baseline audit before a new MSP takes over
  • Annually as part of security hygiene β€” threat landscape changes; last year’s clean report doesn’t mean this year is safe

What You Receive

  • Executive summary β€” overall risk posture, critical findings count, and top 3 priorities for leadership review
  • Technical findings report β€” each issue documented with affected system, severity rating (Critical/High/Medium/Low), evidence, and specific remediation steps
  • Vulnerability scan output β€” Tenable scan results with CVE references, patch status, and exposure timeline
  • Microsoft 365 security review β€” Secure Score breakdown, conditional access gaps, mailbox audit findings
  • Prioritized remediation roadmap β€” what to fix first, estimated effort, and dependencies between fixes
  • Live walkthrough session β€” we review the report with your team, explain findings in plain language, and answer questions

Built for 10–250 User Environments

Our security assessments are designed for small and mid-sized businesses β€” typically 10 to 250 users β€” running a mix of on-premise servers, Microsoft 365, and line-of-business applications. We work with medical practices, legal offices, logistics companies, manufacturing facilities, and professional services firms across the New York metro area.

You don’t need an internal security team to get a thorough assessment. We handle the technical review, explain the results without unnecessary jargon, and help you decide which fixes to prioritize based on your actual risk β€” not a generic framework checklist.

Find Out Where Your Business Is Exposed

Request a security assessment to get a documented review of your environment β€” vulnerabilities, configuration gaps, access risks, and a prioritized fix list. Assessments typically start within one week of scoping.

If you are dealing with an active security concern, contact Support immediately.

FAQ

Most assessments take 5–10 business days from scoping to final report delivery. The timeline depends on the number of users, locations, servers, and cloud services in scope. We confirm the schedule before starting.
No. The review uses read-only access, passive scanning, and non-intrusive tools. Vulnerability scans are scheduled during off-peak hours when possible. Your users will not notice anything different.
We use Tenable for vulnerability scanning, SentinelOne and Huntress for endpoint security review, and Stellar Cyber for cross-environment correlation. Firewall audits cover Fortinet, Cisco, and other platforms. Microsoft 365 audits use native security tools including Secure Score and compliance dashboards.
No. The assessment identifies and documents problems β€” it does not fix them. Remediation and hardening are separate services we offer after the assessment. Many clients use the assessment report to prioritize which fixes to authorize first.
Our assessment covers technical controls that map to common frameworks including HIPAA, PCI-DSS, NIST 800-171, and CIS Controls. We note where gaps exist relative to these standards. If you need formal compliance documentation, we can scope that as a follow-up engagement.

We schedule a walkthrough session to review the findings with your team. From there, you decide which items to address. If you choose to work with us on remediation, we can begin directly β€” there is no need for a separate discovery process since we already understand the environment.

Discuss Your Requirements

If you have questions about this service or want to understand how it fits your environment, get in touch with our team. We’ll review your situation and outline the next practical steps.