Vulnerability services are critically important to maintain the integrity of your internal and external network security. It’s important to keep security measures up to date with the latest patches, updates, and revised threat assessments to ensure you’re protected. However, without the support of a security department, it can be both time consuming and overwhelming trying to ensure your network doesn’t have any vulnerabilities.

In partnership with SRG, SaskTel Vulnerability services simplify network security by assessing potential weak spots in your network, and work with you to develop a plan to keep your information secure.


This service is a component of SaskTel Cyber Security Bundles. Learn more.

Why Vulnerability Service?

SaskTel is your security department, maintaining the integrity of your network’s security, so you can focus on the core fundamentals of your business.

Maintain your reputation by demonstrating that, in the event of a cyber attack, you have taken precautions to protect your business and any customer information you may have.

Collaborate with cyber security specialists who will work with you to understand the assessments that are being performed and help develop a plan to ensure you are staying protected.

Top

Vulnerability Components

Vulnerability Scanning: Vulnerability scanning tests the external and internal networks on a monthly basis. External testing is performed remotely with simulated hacker attempts to gain unauthorized access to information, resources, and assets. Internally, tests are a combination of scanning, information gathering, threat analysis, and reporting to identify vulnerable services, rogue network access points, suspicious configurations and more from a security perspective.

Areas that are reviewed during the testing process include:

  • Data confidentiality risks
  • Access using common hacking attempts
  • Buffer overflows
  • Hosting vulnerabilities
  • Database and middleware vulnerabilities
  • DNS and email vulnerabilities
  • Traffic interception
  • Internal network access
  • Access to shares, devices, testing and production environments

Vulnerability Consultation: Customers will have access to cybersecurity professionals who can provide guidance on addressing any issues that were found in the vulnerability scans. These professionals will spend one hour every three months helping customers develop and implement a plan to remediate vulnerabilities identified in the scanning reports.

Top