Indicator of Compromise Assessment

Our indicator of compromise assessment utilizes our extensive experience within cybersecurity to identify potential malicious compromise signatures that may already exist within your network and systems. This allows us to give you key insights into your environment to assess whether your organization may have already been the victim of a cyberattack.

The Schneider Downs cybersecurity team employs a comprehensive approach to cybersecurity and proactive incident response services that are part of our overall strategy to secure our clients’ networks and key systems. Below are some of the checks that are provided with an indicator of compromise (IOC) assessment:

  • Antivirus log analysis
  • Network device log analysis
  • Web filter log analysis
  • Windows event log analysis from key servers or endpoints
  • Forensic artifacts review of critical Windows systems
  • Cloud log analysis (e.g., Azure, AWS, or O365)
  • Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) log analysis
  • Security Information and Event Management (SIEM) log analysis
  • Email security appliance or software log analysis
  • Network device firmware integrity checks
  • Access point (AP) log analysis
  • Sensitive application/web security log analysis

While the primary goal of the assessment is to determine if there is already a compromise of critical systems, Schneider Downs will also provide a security architecture review and recommend improvements to improve the multiple layers of security protecting your organization. This includes reviewing the following items, leveraging our extensive client experiences:

  • Web filters
  • Antivirus products
  • SIEM products
  • IDS / IPS (integrated firewalls or standalone devices)
  • Data Loss Prevention (DLP) Software
  • Email Security Products
  • Cybersecurity User Education
  • Network Architecture
  • DMZ Architecture
  • Patch Management
  • Windows Event Logging Analysis

case studies

 
big problem:
Ransomware attack halted a global manufacturer's operations.
big thinking:
Recover and secure the system – fast – save $1 million in ransom.
 
big problem:
A not-for-profit client out of 401(k) compliance.
big thinking:
Allowing more contributions by highly paid employees.

our thoughts on

Cybersecurity and nonprofits: Time to button up!

If you were to look up the biggest data breaches over the last 10 years, you would find a gathering of some of the largest companies in the world, many

read more >

Cybersecurity & Employee Benefit Plans

The threat of a cyberattack is prevalent throughout the business world. Given the highly sensitive data held within employee benefit plans, it should come

read more >

The Dichotomy of Cybersecurity in Higher Education

Cybersecurity in the higher education (Higher Ed) realm faces many challenges. Unlike corporate entities, there may be many groups outside of central IT

read more >

New features for enhanced password protection in Azure Active Directory

In a previous Our Thoughts on Article, we described a threat to organizations known as password spraying, in which an attacker attempts to login to all

read more >

Using Your Mail Server Against You

Occasionally on penetration testing/ethical hacking engagements we encounter misconfigured mail servers which creates an opportunity to either gather information

read more >

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

contactsd@schneiderdowns.com
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

contactsd@schneiderdowns.com
p:614.621.4060     f:614.621.4062