As data security environment becomes more risky, Adsero Security offers courtesy IT system scans

December 03 12:53 2017 Print This Article

TAMPA, Fla., Dec. 04, 2017 (GLOBE NEWSWIRE) — As a service to corporate IT teams seeking to strengthen their data security protocols in a business environment that is becoming riskier by the day, Adsero Security announces complimentary external vulnerability scans of internet-facing corporate networks. The risk analysis process includes up to four external domains or IP addresses.

The offer is in response to a dramatic increase in computer-driven cyber-attacks on U.S. firms identified by Adsero’s intercept tracking technologies at its Tampa headquarters.

“In our combined 45 years of experience in IT security, we haven’t seen anything like this before. The hackers’ computers continue the pressure constantly, day and night, until they find a weakness and work their way in,” said Jason Martino, Co-Managing Partner at Adsero Security. “As our systems identify the alarming level of inbound penetration attempts from all corners of the world, and display them on our wall monitors, the trajectories look almost like hundreds of inbound ICBMs at the start of a nuclear war.”

Adsero Security specializes in preparing large firms for data security audits such as the SOC 1 and 2, HIPAA, PCI, ISO/IEC and others, assisting them in addressing deficiencies identified in the audits, writing IT compliance policies, and then implementing ongoing managed security.

“Because we provide compliance, implementation and follow-up services on so many levels for so many types of businesses, we’ve witnessed first-hand how easy it can be for the bad guys to get in,” said Cody Wray, Co-Managing Partner.

Martino and Wray said that as 2017 ends, Adsero Security wants to give back to the business community that has helped their firm be successful, and decided offering the complimentary security scans as a way to do that.

The service is limited to firms $5 million to $100 million in revenue, and includes:

  • A full report of vulnerabilities discovered
  • Recommended solutions for remediation
  • Recommendations for ongoing vulnerability management
  • Compliance policy development consultation

For more information, please e-mail [email protected]

view more articles

About Article Author

Jonathan Yaniv
Jonathan Yaniv

Jonathan is the founder and editor-in-chief of Covering major tech shows such as CES, Jonathan is always there for the latest tech news. Want your gadget to be reviewed or have a release you'd like to be considered for publishing? Send Jonathan an email, jonathan [at]

View More Articles