Most businesses define risk as a function of the likelihood of a threat event’s occurrence and potential adverse impact should it occur. For example, let’s take a look at the risk of electrical shock in three scenarios. First, turning on a light switch in humid weather while wearing rubber soled shoes on a wood floor is unlikely to give you an annoying static shock. On the other hand, playing with downed power lines in the rain is highly likely to cause you great harm. Finally, walking alongside the electrified third rail while wearing metal stilts is especially risky, not only because of the high potential for electrocution, but also because such an accident would cause train delays affecting thousands of people. In other words, we consider things that rarely occur and are only minimally annoying to be low risk. Conversely, things with almost inevitable, catastrophic consequences are considered high risk.
ANALYZING RISKS CAN IMPROVE SECURITY
Take the first step toward a secure network.
Security risk analysis is different from a security assessment. While every company should undergo a thorough evaluation to identify weaknesses, we know that’s only the first step. During the assessment phase, we will determine your external threat landscape and look at your network’s current security configurations. Afterward, we conduct a security risk analysis. That is, we take the findings from your assessment and create a risk model to quantify the likelihood of a security breach. Of course, there are several factors that go into a risk model. Luckily, OnsiteIn60 has the security risk analysis tools you need to turn your free assessment results into meaningful data.