Filament Essential Services Security
External Vulnerability Review
Compliance Audits
We also offer compliance consultations to ensure that your school
policies are compliant in the following areas:
Children’s Internet Protection Act (CIPA)
• I n order to receive e-rate funding, schools must filter their Internt
services and have implemented formal Internet Safety Policies
Children’s Online Privacy Protection Act (COPPA)
• If your school collects PII from children under 13 years of age, you
must be COPPA compliant
Health Insurance Portability and Accountability Act (HIPAA)
• Special Education, nurses, athletic training files contain medical
information that must be protected
Take a proactive approach to security. We’ll create effective strategies and policies to take you into the future with confidence. Based on your needs, we offer:
• Digital Policy Review
• Firewall Rule Review
• Remediation Planning
• Systems Procedures Review
• Training of all staff on reducing security risks
Security Services
External vulnerabilities are opportunities for attackers outside your organization to gain access to your network and sensitive data.
Vulnerability Scan
Our security experts will scan your network and identify vulnerabilities on all internet-visible services. We will test your system using known software exploits that can be used to attack your network.
Time to completion: 2 weeks
What you get: The unedited, system-generated report will be provided which will identify potential security threats.
Vulnerability Assessment
In addition to the vulnerability scan, the assessment will go further by validating and analyzing the results for you and provide an explanation in greater detail to help you better understand the results.
Time to completion: 3 weeks
What you get: A written report explaining the findings from the vulnerability scan and one hour of review with our security experts.
Consultation Packages
Your organization can receive a consulting session with one of our security experts to help you fully understand the results of the assessment, understand our specific opinions of these results, and help plan remediation efforts, as well as other options to improve your security posture