Cybersecurity Assessment and Remediation2018-05-31T19:55:28+00:00


“To be truthful, we’d identified our security problems, and it was wonderful to have Cornerstone resolve them.”

-Law Firm CIO


It’s essential to protect your work product and your clients’ data. Cornerstone Information Technologies, LLC has the expertise to ensure you are doing your best to protect your network. From current threats and vulnerabilities to best practices and regulatory compliance, our knowledgeable team skillfully handles every detail. Our security program includes a multi-layered design, including next generation firewalls, artificial intelligence-based anti-virus, data encryption, backup, security awareness training, network monitoring, and more.

We have a two-step process:

1. Perform a security assessment and remediate existing vulnerabilities.

2. Schedule regular vulnerability scans and apply updates that ensures your network has the latest security patches.

Cornerstone.IT has the vulnerability scanning tools to scan on your external and internal networks. Externally, we will scan your firewalls, routers, NetScalers, etc. to ensure they are configured properly and have the latest vulnerability patches. But, more importantly, most breaches are executed internally either from a phishing attack or an employee. Cornerstone.IT will scan your internal networks to find those devices that have fallen outside of your regular updates. We will then review the vulnerability report with your staff and put together a remediation plan to update or remove those unsecure devices. We will start with the high-priority vulnerabilities and work through until your entire network is secure.

Regular Maintenance
Following this initial remediation, Conerstone.IT will set up a managed services package that will scan and update your network monthly, quarterly or annually, depending how often security patches become available. For those firms that prefer to have their managed security service provider (MSSP) separate from their implementation partner, Cornerstone.IT can execute on the remediation plan or vulnerability scan from your MSSP.

Health and Risk Assessment

Are your users complaining about Outlook running slow? Are they experiencing dropped connections in Citrix? Cornerstone Information Technologies is familiar with these issues. We have performed many Citrix and Exchange health checks and have resolved most slowness and connectivity issues we have faced. Sometimes it’s misconfiguration, sometimes it’s the network infrastructure, but whatever the cause, Cornerstone.IT has the expertise to solve your nagging problems. Let Cornerstone.IT perform a health check and remediation to resolve these ongoing issues.

Risk Assessment

Annual Budget Preparation

Annual budget preparation is a stressful and time consuming process. We can help. Cornerstone.IT can do the research for you and obtain competitive pricing for the hardware, software and services. We will prepare a document that includes options, along with estimates, making it easy for you to provide a detailed report to your firm’s management.

Our budget will include:

Top 10 Questions to Consider When Planning Next Year’s IT Budget

1. How am I securing applications and data on devices?
2. How can I leverage Microsoft Azure for production or disaster recovery systems?
3. Will my Citrix system support my firm during a disaster?
4. Can my remote users access their document management system easily and securely?
5. What am I missing in my Office 365 migration?
6. Are all of my applications ready for Windows 10? Do they support SAML authentication?
7. Do I have a security awareness training program in place?
8. How am I governing and disposing of old data?
9. Is my monitoring system proactively alerting me to potential problems?
10. When was the last time I scanned both my external and internal systems for security vulnerabilities?

Technology Roadmap

When was the last time you reviewed your overall computer network? Has it been a few years? It may be time for a holistic assessment of your technology where we can work together to strategically plan what your end users need to be productive and profitable in the coming years.

We will identify and prioritize what technologies need to be upgraded, developing a three to five year technology improvement plan. We work with numerous vendors, such as Microsoft, Citrix, Cisco, VMware and iManage, and will customize your project to meet existing and future needs. Our job is to understand the costs and risks of these IT projects. During our Technology Assessment, our experts will work with both the IT and business departments of your organization to find the plan that works best for your budget.