Security Assessment
Most security incidents trace back to misconfigurations, stale credentials, unpatched systems, and access controls that were never properly set up or reviewed. We perform structured security assessments using industry tools β including Tenable for vulnerability scanning, SentinelOne for endpoint analysis, and Stellar Cyber for cross-environment visibility β to identify exactly where your business is exposed and what to fix first.
DK’s Enterprises has delivered security and IT services since 1999. We assess environments for businesses across NYC (all 5 boroughs), Nassau County, Long Island, and Northern New Jersey β including Essex, Hudson, Union, and Middlesex counties.
What We Actually Check
Having antivirus or a firewall does not mean your environment is secure. Configuration quality, access hygiene, and patch discipline matter more than the tools themselves. Our assessment examines the areas where real breaches happen:
- Active Directory and identity: admin accounts, group policy settings, password policies, stale accounts, privilege escalation paths
- Multi-factor authentication: MFA coverage across Microsoft 365, VPN, RDP, and admin portals β including gaps in conditional access policies
- Endpoint security posture: SentinelOne or existing EDR agent status, policy enforcement, detection rule updates, and device compliance
- Vulnerability scan results: Tenable-based scanning of internal and external assets β CVE severity scoring, missing patches, exposed services
- Firewall and perimeter: Fortinet or existing firewall rule review β unused rules, overly permissive policies, VPN configuration, NAT exposure
- Microsoft 365 security: Secure Score review, mailbox forwarding rules, app permissions, SharePoint/OneDrive sharing policies, audit logging status
- Backup security: access segregation, retention policies, immutability settings, recovery test records
How the Assessment Works
We follow a consistent 4-phase process aligned with NIST Cybersecurity Framework and CIS Controls principles:
- Scoping and access. We define what systems, accounts, and network segments are in scope. You provide temporary read-only access or credentials β no agents are permanently installed during assessment.
- Technical review. We run vulnerability scans (Tenable), review endpoint protection status (SentinelOne/Huntress), audit Active Directory, examine firewall rules (Fortinet/Cisco), and check M365 configuration. This typically takes 3β5 business days depending on environment size.
- Analysis and prioritization. Findings are scored by severity and business impact β not every vulnerability is critical, and we separate the urgent from the routine so you can focus budget where it matters.
- Report and walkthrough. You receive a written report with specific findings, affected systems, severity levels, and recommended fixes. We walk through the report with your team and answer questions before any work begins.
Common Findings We Uncover
After completing over 2,500 IT projects since 1999, we consistently see the same categories of risk β even in organizations that believe they are well-protected:
- Domain admin accounts used for daily work β a single compromised credential gives full network control
- MFA disabled on admin portals or VPN β often the entry point for ransomware attacks
- Firewalls with “allow all” outbound rules β malware exfiltrates data undetected
- Unpatched Windows servers running critical services β known CVEs with public exploits available
- Microsoft 365 mailbox forwarding rules to external addresses β active or dormant compromises
- Backup credentials stored on the same domain β ransomware encrypts backups along with production data
- Endpoint protection installed but not reporting or updating β no visibility when agents silently fail
- Legacy systems (Server 2012, Windows 10 EOL) on flat networks β no segmentation isolating vulnerable machines
If any of these sound familiar, an assessment will quantify the actual risk and show you what to fix first.
When You Should Run an Assessment
- After a security incident or close call β phishing success, unauthorized access, ransomware attempt
- Before or after infrastructure changes β server migration, firewall replacement, cloud adoption
- During compliance preparation β HIPAA, PCI-DSS, NIST 800-171, or cyber insurance applications
- After IT staff turnover β verifying what previous admins configured and what they left behind
- When switching IT providers β baseline audit before a new MSP takes over
- Annually as part of security hygiene β threat landscape changes; last year’s clean report doesn’t mean this year is safe
What You Receive
- Executive summary β overall risk posture, critical findings count, and top 3 priorities for leadership review
- Technical findings report β each issue documented with affected system, severity rating (Critical/High/Medium/Low), evidence, and specific remediation steps
- Vulnerability scan output β Tenable scan results with CVE references, patch status, and exposure timeline
- Microsoft 365 security review β Secure Score breakdown, conditional access gaps, mailbox audit findings
- Prioritized remediation roadmap β what to fix first, estimated effort, and dependencies between fixes
- Live walkthrough session β we review the report with your team, explain findings in plain language, and answer questions
Built for 10β250 User Environments
Our security assessments are designed for small and mid-sized businesses β typically 10 to 250 users β running a mix of on-premise servers, Microsoft 365, and line-of-business applications. We work with medical practices, legal offices, logistics companies, manufacturing facilities, and professional services firms across the New York metro area.
You don’t need an internal security team to get a thorough assessment. We handle the technical review, explain the results without unnecessary jargon, and help you decide which fixes to prioritize based on your actual risk β not a generic framework checklist.
Find Out Where Your Business Is Exposed
Request a security assessment to get a documented review of your environment β vulnerabilities, configuration gaps, access risks, and a prioritized fix list. Assessments typically start within one week of scoping.
If you are dealing with an active security concern, contact Support immediately.
FAQ
We schedule a walkthrough session to review the findings with your team. From there, you decide which items to address. If you choose to work with us on remediation, we can begin directly β there is no need for a separate discovery process since we already understand the environment.
