Our Services
Network Security
In order to satisfy business communications needs, information networks have grown exponentially resulting in today's huge data exchange capacity. Unfortunately, this increase also has a price and negative outcomes were predictable as the rate of computer crime is rising and will continue to do so. These high speed networks, which link you up with your customers and providers, also became a point of connection for hackers.
Lexicon IT Security can provide vulnerability assessments, web application assessments, network security audits as well as remediation and then provide a comprehensive and executive report for review with our clients.
Security Policy and Awareness
Policies define why information security is important to the organization and describe the organization's high-level information security philosophy. Policies should be brief technology and solution-independent documents that generally are expected to remain relevant and applicable for a substantial period of time . Security involves people as well as systems and Lexicon IT will work with each client to develop an effective, responsive security policy that is tailored to your specific business needs and remain cost effective. We review each client's business and related security goals and requirements. We then assess your current IT strategy and security concerns, identify gaps in existing policies as well as developing new requirements for security management and provide clear security polices for management and operational staff.
Click Here to Learn More
Vulnerability Assessment
The effectiveness of existing security controls is crucial in the continued success of an organization's security strategy. Lexicon IT Security will work with you to identify security weaknesses associated with your network, operating systems, servers, and system applications. Our consultants will also help you identify and mitigate risks and vulnerabilities associated with your wired and wireless networks.
Lexicon IT Security gathers network information, and in some cases, simulates a malicious intruder. Then, we run automated scanning tools and use manual testing to discover system vulnerabilities. Our vulnerability assessment service provides a thorough, hands-on security assessment to ensure that the security of your network and system is appropriate to your business and operational needs. The vulnerability assessment report includes analysis of findings along with a detailed action plan for improving your systems and network's overall security posture.
Click Here to Learn More
PCI Security Assessments
There have been some high profile security breaches with some major retailers that have put credit card holders’ information at serious risks and perpetuate credit card fraud and consumer identity theft. These risks outline major deficiencies within the security posture of some organizations. In order to minimize credit card fraud incidences, The PCI DSS (Payment Card Industry Data Security Standard) was created to minimize credit card fraud and by creating a standard set of best practices for overcoming security shortcomings.
The Payment Card Industry Data Security Standard (PCI-DSS) was originally established by Visa and MasterCard and then adopted by other payment card providers, including American Express, Discover, Diners Club and JCB.
The standard has 12 requirements designed to ensure the confidentiality and integrity of customer credit card information. The PCI DSS standard includes requirements for security management, policies, procedures, network architecture, software design, and other security measures.
Merchants and retailers accepting credit cards will have to comply with the PCI DSS standard; fortunately, doing so should not be overly burdensome for those who already have security measures in place. For those that do not have the right security measures in place and a breach happen, there is a significant price to pay for not doing the due diligence and due care that is needed. You and your organization could face some stiff fines and that is nothing compared to the possibility of tarnishing your brand and losing consumer confidence.
Do not rely on inexperienced vendors or consultants for this important work which can lead to incomplete assessments or improper remediation recommendations and leading to non-compliance with the PCI standard and the potential for heavy fines or restrictions. Let Lexicon IT Security provide you with the professional security service you deserve. We will provide a pre and post PCI assessment and help you identify existing gaps and a comprehensive roadmap on how to bridge those gaps.
Technology Implementation and Integration
Information technology continues to grow explosively while new security technologies emerge to protect growing security threats. Organizations constantly face the challenge of selecting, testing, and integrating security products and technologies into their computing infrastructure.
Lexicon IT Security’s consultants are closely connected with the security industry. As such, we have easy access to information on new development in security technologies, as well as the latest security threats, vulnerabilities, and exploits. Our Technology Implementation and Integration service helps your organization assess critical security technology products suitable to your business processes and goals. Further, we work with you to determine the proper installation, configuration, and integration procedures to implement to ensure seamless operation of your networking environment.
Our expertise in these technologies and our unbiased approach to technology selection, assures that your security technology investments provides the highest return on security investment at the same time that your valuable business assets are protected.
This service includes hands-on third-party systems selection, testing, integration, configuration, and installation. Some of the technologies that we have successfully deployed include: firewall, intrusion detection systems (IDS), virtual private networks (VPN), strong authentication, content filtering, HIPAA solutions and other emerging technologies. Lexicon IT Security tailor each technology solution to your unique computing environment.
Security Awareness
Studies have shown consistently that 80% of security incidents are caused by an organization’s staff. Many of the incidents involve errors and omissions like leaving a laptop computer or Mobile/PDA device that holds unprotected customer or critical business data on an airplane or in a taxi cab. Effective security and privacy awareness training programs should focus on behaviors; capture a baseline of staff knowledge, perceptions and actions. Security Awareness programs have the highest ROI (Return on Investment) compared to almost all other security countermeasures.
Lexicon IT Security can provide a multitude of information security and privacy services. We will work with your organization on assessing your awareness needs and goals with posters, tip sheets. We also provide awareness training and education from basic information security, phishing, pharming to all levels of employees from technical, non-technical and Executive level.
Healthcare Security
Information security is critical to healthcare organizations as it directly relates to patient trust in your organization, your organization's reputation, and has enormous legal liability if compromised. Data breaches containing electronic patient healthcare information (ePHI) have affected millions of customer records in the last several years.
It's not just best practice anymore to protect patient information; it is a legal requirement by HIPAA- the Health Insurance Portability and Accountability Act. Sharing that data with other hospitals and healthcare providers, insurance companies, business partners and suppliers is a challenge because each could have varying standards in their security posture and practices. But your organization is required to create and implement security procedures and policies to insure that when that confidential data travels to and from your organization's information network, it remains safe and uncompromised.
Lexicon IT Security can provide hospitals and healthcare organizations with a proactive strategy to effectively manage sensitive patient information by developing a security program to meet your specific organization's regulatory and compliance needs.
Click Here to Learn More
Identity Management Solutions
In order to effectively maintain and stay aligned in today's business environment, companies are increasing the number of users, customers, employees, partners and suppliers that are allowed to access your organizations information. As IT and security is challenged to do more with fewer resources, managing user identities and their access to resources throughout the identity lifecycle is even more difficult. Lexicon IT Security IdM solutions can help you get users, systems and applications online and productive fast, maintain dynamic compliance to increase the resiliency and security of the IT environment, while helping to reduce costs and maximize return on investment. Our comprehensive approach will give your organization what it needs to be successful and meet the stringent compliance and governance regulations.
|