Search

Hostek security audit

The audit conducted by our partners Hostek is a top-level assessment of the security status of the technical infrastructure used by your company.

Depending on the plan you choose (detailed descriptions of the plans are provided below), you can order the most appropriate security compliance audit option for you. Register for a free consultation to discuss the security issues of the infrastructure you are using that is relevant to you!

Basic annual audit
Identification of problem areas and
elaboration of a detailed action plan
Yes
Security assessment of servers and
other applications in use
Yes
Ensuring secure control access
(VPN, IP address source)
Yes
Turning off unnecessary servicesYes
Turning off public IP portsYes
Encryption (SSL/TLS) check
(protocols and encodings)
Yes
Check of existing antivirus
(EICAR test)
Yes
Check of backups and restore
possibilities
-
Check of vulnerability of application code
and applications used
-
Assessment of vulnerability of internet
applications used, update of applications
-
Check of the operating system
(resources used, statements, updates)
-
Penetration testing, identification of security
vulnerabilities and malicious code
-
Network vulnerability check and
intrusion testing
-
XSS (cross-site scripting) testing-
Submission of reports on hacking and
other risks
-
Exceptionally detailed annual audit
Identification of problem areas and
elaboration of a detailed action plan
Yes
Security assessment of servers and
other applications in use
Yes
Ensuring secure control access
(VPN, IP address source)
Yes
Turning off unnecessary servicesYes
Turning off public IP portsYes
Encryption (SSL/TLS) check
(protocols and encodings)
Yes
Check of existing antivirus
(EICAR test)
Yes
Check of backups and restore
possibilities
Yes
Check of vulnerability of application code
and applications used
Yes
Assessment of vulnerability of internet
applications used, update of applications
Yes
Check of the operating system
(resources used, statements, updates)
Yes
Penetration testing, identification of security
vulnerabilities and malicious code
Yes
Network vulnerability check and
intrusion testing
Yes
XSS (cross-site scripting) testingYes
Submission of reports on hacking and
other risks
Yes
Three-monthly audit
Identification of problem areas and
elaboration of a detailed action plan
Yes
Security assessment of servers and
other applications in use
Yes
Ensuring secure control access
(VPN, IP address source)
Yes
Turning off unnecessary servicesYes
Turning off public IP portsYes
Encryption (SSL/TLS) check
(protocols and encodings)
Yes
Check of existing antivirus
(EICAR test)
Yes
Check of backups and restore
possibilities
Yes
Check of vulnerability of application code
and applications used
Yes
Assessment of vulnerability of internet
applications used, update of applications
Yes
Check of the operating system
(resources used, statements, updates)
Yes
Penetration testing, identification of security
vulnerabilities and malicious code
Yes
Network vulnerability check and
intrusion testing
Yes
XSS (cross-site scripting) testingYes
Submission of reports on hacking and
other risks
Yes
Register for a free consultation to discuss the security issues of the infrastructure you are using that is relevant to you!

First of all, we recommend that you register for a free consultation. During this consultation, you will discuss all your concerns with security experts and draw up a preliminary plan for further action. All of this will make it easier to assess which security package would be most useful for you.

Please note that the consultation will be provided in English.

Our system administrators oversee the security of servers. A very detailed audit of the security of your entire organization’s IT infrastructure requires much broader expertise. Therefore, when offering this service, we work with reliable partners, who have been working in the security field since 1998 – Finnish company Hostek.

A reliable, secure IT infrastructure is essential for all companies, whether large or small, whether business or non-profit organizations. In order to ensure the success of an organization, it is necessary to manage and prevent any risks in advance. The security audit identifies the main security vulnerabilities in the organization’s IT infrastructure that threaten the security of both the company’s assets and customer data.

If you lack information or need answers to specific questions related to your company’s IT infrastructure, we invite you to register for a free consultation. You will be contacted by an experienced security expert who can assess your specific case in a professional manner, possibly immediately identify critical areas and answer other questions.

Since the security audit process is personalized and meets the specific needs of your company, this service is not covered by a refund guarantee.