ABOUT 2018-04-11T09:27:58-05:00

ABOUT GULF GUARD CYBER.

For nearly 50 years Gulf Guaranty has been a trusted provider of insurance services in Mississippi’s banking community. In addition, the Company has a successful track record in technology. It led the way in loan automation software with its Gulf Pak division, ultimately serving over 800 banks. Today, we reignite our technology expertise with our cyber vulnerability analysis specifically designed to keep your Board of Directors abreast of a company’s cyber risk posture.

The company’s Chief Technology Director is Trent Townsend. With over 15 years of experience in the cybersecurity field, Trent understands the complexities of analyzing risks and the hurdles companies face to protect themselves from them. For 6 years Trent served as an Information Security Officer for the U.S. Department of Defense. He is a Certified Information Systems Security Professional (CISSP) and was selected as one of MS Business Journals Top in Tech in 2017.

Cyber Director is not a replacement for an organization’s annual IT audit.  While annual audits are a vital part of a company’s preventative risk process, the reality of technology makes the audit practically obsolete as soon as it is completed. We have found sever vulnerabilities days after an annual IT audit was conducted. Similar to the annual IT audit, the Cyber Director is an independent, unbiased reporting tool that provides the Board an ongoing assessment of potential threats in a format that is easily understood by the layperson.

In instances where an organization employs a 24/7 network monitoring service, Cyber Director’s provides unbiased report  to the Board  about the performance and effectiveness of the service.  In case the of a cyber breach, Directors are likely to learn too late that while services and preventative measures may be outsourced, responsibility for protecting sensitive data cannot be outsourced.  Adding the Cyber Director to your team  demonstrates the board’s proactive  initiative to oversee the a company’s cyber risks… no matter who is providing its IT support.

That depends.  Scanning without credentials gives you the same view as a would-be attacker which in itself is valuable.  The results will show only those vulnerabilities that are detectable directly from the network and the high severity issues found during this type of scan need to be fixed ASAP because they are probably exploitable from the network without any user action required.  Scanning with credentials gives you more information such as missing patches, misconfigurations of services, and other information that just cannot be retrieved without credentials.  For example, a scan without credentials may detect 10 missing patches.  That same scan with credentials may detect 120 missing patches.

LET US SHOW YOU
WHAT WE BRING TO THE TABLE.

CONTACT US