Documentation and Auditing

Documentation can be challenging, but it doesn't have to be anymore


  • Business Continuity Plan
  • Acceptable Use Policy
  • Incident Response Policy
  • Business Impact Analysis
  • Cybersecurity Policy
  • Pandemic Response Policy

Comprehensive Auditing

CNET Inc. will provide a detailed and cohesive report, provided by our certified auditors, detailing all of the findings and potential risks facing your organization.

Internal Vulnerability Scan

An Internal Vulnerability Scan is designed to uncover and assess risk by exposure on network devices. Some of the common security risks found are unpatched computers/servers, substandard configuration of public facing devices, such as firewalls, out of date firmware on cameras and switches, and unnecessary services running on printers. While each device needs to be secured, it is also important to analyze the security controls of the network. Secure passwords need to be utilized and models such as the principle of least privilege need to be implemented. These security measures help prevent attackers from pivoting from one compromised device to another and gaining elevated privileges.

External Vulnerability Scan

An External Vulnerability Scan covers an in-depth discovery of all public-facing IP addresses, DNS entries, and MX records. Securing public-facing network devices includes eliminating unnecessary services and maintaining up to date systems. Domain spoofing is a common tactic when social engineering methods such as phishing are exercised. Domain spoofing can be combated is by properly implementing an SPF (Sender Policy Framework) record. SPF enables mail servers to verify emails come from the listed domain.