Defcon-5 Home > Services > Specific Services
 

Computer Security Auditing Services

Defcon-5 can audit your company's employee computers for potential security issues.

Malware, Spyware, and Viruses

During our analysis we often find that employee computers are infected by some sort of malware, be it spyware, viruses, or worms. This malware not only poses a security risk to your systems and information, but also causes a loss in employee productivity. Malware and viruses can quickly slow down or render a computer unusable, which in today's work environments mean that the employee is unable to work, or is unable to access resources. This can result in a loss of sales, decreased support to your customers, and possibly loss of data.

Security Configuration Issues

During our auditing we almost always find security configuration issues with client computers. These issues can range from lack of account lockout policies, and lack of strong password policies, to unnecessary user permissions, and missing critical security updates. When it comes to security you must expect the unexpected, and often we find that most businesses do not think about what would happen if one (or more) of their employee computers where to be stolen. It can be quite surprising to learn how much critical information is stored on each individual employee computer, and even more amazing that it is often not backed up or encrypted in some manner. During our audit process we can identify these issues and if you want we can assist you in correcting them to increase the security of your information.

How does this service work?

We visit your site, and check each individual computer used by your employees in their daily jobs. We first check various areas of the computer to see if we can find any Malware such as spyware and viruses. Depending on if you give us approval to do so before we start work, we will remove the malware that we find. We then make note of the malware that we found, to provide in a report at the end of our audit. We then move to checking the security configuration on the computer, going through the same processes we make notes of what we find, and what we correct and provide them to you at the end of our audit in our final report. We will then move on to the next computer until we have completed our job. As you can see we thoroughly check each computer, and document what we find. We can perform this service on specific computers or all of the computers in your organization. A typical audit can take about 30 to 40 minutes per computer, but depends on the operating system, and speed of the computer. If we are asked to correct the issues we find as we find them the process can take an hour or more per computer depending on the number of issues found.

If you want a general idea of the security of your employee's computers we can perform an audit on a few sporadic computers, and compile our audit report for your review. This can give you a general overview of the level of security your employees have on their computers. At the same time this can be very cost effective for small businesses that want an idea of what they need to do to improve security, but may not have the resources at the current time to fix all the issues.

Defcon-5 will work with you to find the optimal security options for your organization, to fit your budget. Feel free to contact us to discuss pricing, and other options or questions that you might have.

About Us - Contact Us - Employment - Forum - Home
Privacy Policy - Search - Services
© 2025 Defcon-5. All Rights Reserved