Are Dangerous Cyber Security Threats Lurking Right Under Your Nose? – See Where You Stand with GDF’s Digital Asset Threat Assessment (DATA) Program

Share Article

Technology advances at a blazing pace. As it does, computing options are also rapidly evolving to squeeze every drop of convenience possible out of the vast array of devices, platforms, programs and applications which are increasingly relied on every day. The separation between work and play is also getting harder to define with personal devices flooding the cyber landscape, making it a brand new ballgame for many organizations that find themselves gasping for air while trying to keep up from a security perspective. Global Digital Forensics is adding a newly focused service called the Data Asset Threat Assessment (DATA) program to its arsenal to help clients successfully adapt to the numerous new security challenges they are forced to face.

News Image
Global Digital Forensics is introducing the new Digital Asset Threat Assessment (DATA) program to help clients get a handle on dangerous security issues being introduced by today’s expanding reliance on mobile, social networking and cloud technologies.

As the digital universe expands, the threat landscape is becoming much broader and far more complex. And with the BYOD (Bring Your Own Device) phenomenon in full bloom, controlling all the data coming from and going to mobile phones and tablets is adding an entirely new security headache to the mix. These devices have full bore operating systems and fairly powerful processors, not to mention a full rainbow of exploitable apps, all of which are, or should be, forcing security professionals to approach conducting data security assessments with an entirely new perspective as they walk the fine line between personal and business devices, which is a line that seems to be getting redrawn every day.

At Global Digital Forensics, our digital asset threat assessments must continuously evolve to keep pace. Global Digital Forensics has been pioneering the digital frontier for over two decades, staying on the cutting edge of technology and its constantly shifting role in today’s worlds of business and society, and helping clients deal with problems when they converge. To that end, Global Digital Forensics is introducing the new Digital Asset Threat Assessment (DATA) program to help clients get a handle on dangerous security issues being introduced by today’s expanding reliance on mobile, social networking and cloud technologies.

Joe Caruso, founder and CEO/CTO of Global Digital Forensics, has many years of experience in network administration, penetration testing, integration engineering, incident forensics, and cyber intrusion/data breach response under his belt, and the great diversity of working with everything from giant corporate IT departments, to small and mid-sized business, as well as lawyers and law firms, gives him great insight into the newest trends developing in the world of computing, and the threats that inevitably follow. It’s this insight that led Global Digital Forensics to develop DATA, a threat assessment service with a much stronger focus on the burgeoning digital technologies that are filling all the nooks and crannies of the digital landscape.

As Caruso puts it, “It never ceases to amaze me how so many organizations with a great handle on network and mainframe security completely drop the ball when it comes to the avalanche of other devices and outside sources being used to transmit, receive, manipulate and store sensitive organizational data. If an organization doesn’t have policies and procedures already in place to deal with this aspect of cyber security, it’s a disaster just waiting to happen. That’s why we developed the DATA program, to focus much needed awareness on this exponentially expanding problem. Any threat assessment without it is really just incomplete going forward.”

Some of the areas the DATA program focuses on:

·         Mobile device security (policy and technical solutions) - how are they managed and what is the policy on those devices?

·         BYOD policy and solutions – users connecting a myriad of devices, not just smart phones, but tablets, eReaders, GPS devices, etc.

·         Contractor equipment

·         Appliances and vendor managed systems

·         Supply chain and supplier systems

·         Devices regulated by authorities such as the FDA (CAT and PET scanners etc.)

·         Temporary users and their devices

·         And more…

“We do network security penetration testing for some of the most recognized organizations in the world, so offering our clients the option to include the new DATA program features to our professional penetration tests just makes sense on so many levels. It fills a growing and often overlooked gap which can have grave consequences if exploited, it hardens an organization’s security posture to meet and/or exceed regulatory compliance requirements, and it improves both client and affiliate trust when they know every effort is being made to protect their sensitive data from the most modern and constantly evolving threats. If our experts are already at a client site to do penetration testing, physical security checks, social engineering threat assessments and the like, it’s a perfect opportunity to kill two birds with one stone and substantially bolster an organization’s cyber security posture, not just network and mainframe security, but every facet of their unique digital asset landscape. Otherwise it’s like waxing and polishing an old weather-beaten jalopy, it may look a little better, but if attention isn’t paid to what’s actually under the hood, it still can’t be trusted to get you safely where you want to go.”

Call 1-800-868-8189 for a free initial consultation with a Global Digital Forensics cyber security specialist to learn more about GDF’s new DATA program, and about tailoring a comprehensive cyber threat assessment plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical when a breach has occurred, so don’t hesitate to get help if an incident has already happened. For more information, you can also visit

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Aris Demos
Visit website