FAQ

Why does my business need a Cyber Risk Assessment?

A Cyber Risk Assessment is critical for protecting your business and maintaining compliance with federal and industry-specific regulations like HIPAA, CMMC, FTC Safeguards, IRS Pub 4557, SEC, and SOX.

Without one:

  • Your cyber insurance claim may be denied in the event of an attack
  • You risk falling out of compliance with federal or contractual data security standards
  • You have no baseline to measure improvements or expose vulnerabilities

A proper cyber risk assessment helps you:

  1. Understand where your business is vulnerable
  2. Document risk posture for audits or insurance
  3. Prioritize security investments with clarity
  4. Satisfy legal and regulatory requirements
  5. Reduce your chances of a breach and its financial impact

Bottom line: You can’t protect what you haven’t assessed — and insurers, auditors, and regulators know it.

What does a Cyber Risk Assessment include?

At Enterprise Technology Solutions, we deliver comprehensive, compliance-aligned Cyber Risk Assessment using the Telivy platform and our own deep technical expertise. This isn’t just a checkbox scan, it’s a full-spectrum evaluation of your people, processes, and technology, mapped to the standards that matter most: HIPAA, CMMC, FTC Safeguards, IRS 4557, SOX, CIS, NIST, ISO and more.

🔐 1. External Threat Surface Scan

We scan your external-facing systems and public domain information to identify:

  • Open ports and exposed services
  • SSL/TLS vulnerabilities
  • DNS and email configuration issues (e.g., SPF/DKIM/DMARC misconfigurations)
  • Leaked credentials and dark web exposures
  • Internet-facing device risks

✅ Think of this as your digital storefront — we check what hackers see first.


🛡 2. Internal Network & Endpoint Security Review

We evaluate the security of your internal IT infrastructure, including:

  • Firewall rules and segmentation
  • Patch management policies
  • Endpoint protection software
  • USB/device control and encryption
  • Remote access (VPN, RDP, etc.)

✅ Are your internal systems locked down — or wide open once someone gets in?


🧠 3. Social Engineering & Phishing Simulation

We run a real-world phishing simulation against your staff to test:

  • User awareness and susceptibility
  • Click-through and credential submission rates
  • Reporting behavior (who reports suspicious emails?)

Then, we provide:

  • Metrics by user/department
  • Training recommendations
  • Optional remedial awareness training follow-up

✅ People are often the weakest link. We help you find and fix that before attackers do.


🧾 4. Policy & Compliance Documentation Review

We evaluate your documentation and policies against your regulatory requirements, including:

  • Written Information Security Program (WISP)
  • Access control policies
  • Incident Response Plan (IRP)
  • Vendor risk management procedures
  • Data retention and disposal standards

✅ Without documentation, your controls don’t exist in the eyes of an auditor or insurer.


🧪 5. Security Controls Gap Analysis

We map your current controls against industry frameworks and flag:

  • Missing MFA or encryption
  • Inadequate access provisioning
  • Poor password hygiene or lack of SSO
  • Lack of backup validation or disaster recovery testing

✅ You’ll receive a gap analysis prioritized by risk severity and compliance exposure.


📊 6. Executive Risk Report & Action Plan

At the end of your assessment, you’ll receive a customized, plain-English report that includes:

  • Risk scorecard
  • Vulnerability summary
  • User simulation outcomes
  • Compliance alignment overview
  • Prioritized remediation roadmap

You can use this report to:

  • Prove due diligence to insurers and regulators
  • Guide internal security upgrades
  • Document risk for board or executive review
  • Satisfy audit requirements

✅ We give you the roadmap — not just a scan and a PDF.


🎯 Let’s Start With a 15-Minute Cyber Strategy Session

We’ll walk you through what to expect, understand your business, and determine the right scope. It’s quick, no-pressure, and high-value — especially if you’ve never run a formal risk assessment.

👉 Book Your Free Cyber Risk FTA Now
📞 Or call 808-377-6300 to talk to a real human who understands Hawaii’s business environment

What’s the difference between an MSP and a break/fix IT provider?

MSPs proactively manage and secure your IT infrastructure, while break/fix models wait for things to go wrong. In today’s risk-heavy climate, reactive IT support is a liability. Break/Fix providers generally do not provide cybersecurity services, even though you may think they have it covered.

Is my small business really a target for cyber attacks?

Yes 43% of cyber attacks target small businesses. Threat actors know you’re often under-defended and use ransomware and phishing to exploit that. On top of that, 60% of small businesses close within 6 months of a cyber attack.

Do I need to be HIPAA or FTC compliant if I’m a contractor or property manager?

If you handle personal data (even indirectly), you’re likely subject to compliance frameworks. FTC Safeguards and IRS data protection rules now apply to many non-medical industries. If you’re a contractor doing work for the federal government you’ll need to look into CMMC or FedRAMP certifications.

What is FTC Safeguards Rule compliance?

It’s a legal requirement for financial and non-financial institutions to implement a written information security program, including access controls, encryption, vendor oversight, and risk assessments.

How often should we conduct a Cyber Risk Assessment?

Annually at minimum, or whenever you undergo major tech changes, add remote employees, or adjust your regulatory exposure.

What happens if my business fails a compliance audit?

You could face fines, breach-of-contract claims, lost clients, and legal exposure. Worse, many insurance carriers may deny claims if your posture wasn’t properly documented.

How much does a Cyber Risk Assessment cost?

Varies based on size and complexity, but ETS offers assessments tailored to SMBs with actionable reporting — not just boilerplate scans. Book a free discovery call to learn more.

What is included in your 15-minute Strategy Session?

We’ll ask the right questions to understand your environment, identify any red flags, and determine if a deeper engagement makes sense for both of us. No pressure, no obligation.