Cyber Risk Assessment

Cornerstone will assess the design and effectiveness of each category in the NIST Cyber Security frameworks on an executive level in an effort to get a baseline understanding of the client’s security posture.

Vulnerability Assessment

Cornerstone will use our methodology to further refine and guide our evaluation of the maturity of your company’s IT infrastructure. Cornerstone’s methodology for our vulnerability assessment is divided into two stages.

Education and Training

Technology is rapidly changing which creates new opportunities for malicious actors to take advantage of uninformed employees. Our team’s combined knowledge makes us a perfect solution to educating your employees on ongoing cybersecurity best practices and risks.

Call Us for a Cybersecurity Assessment

CP Cyber (Cornerstone Partners) Cybersecurity in the News:

May 19, 2020, “Beware of scammers trying to take advantage during pandemic” Fox 31 News asks CP Cyber to provide recommendations for reacting to the increasing number of scam calls, texts, and emails. Here is the full article: https://kdvr.com/news/problem-solvers/beware-of-scammers-trying-to-take-advantage-during-pandemic/

April 15, 2020, “Thousands of Zoom accounts were released online. Here’s how to keep your account safe.” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), Donald confirms that Zoom, the popular web conferencing platform, is safe to use so long as you take a few key actions first. Here is the full article: https://www.thedenverchannel.com/news/coronavirus/thousands-of-zoom-accounts-were-released-online-heres-how-to-keep-your-account-safe

April 8, 2020, “Researchers develop COVID-19 study you can participate in from home” Denver 7 News asked Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), to comment on the app released to help researchers collect data and the loss of privacy that comes with sharing your health and location data. Here is the full article: https://www.thedenverchannel.com/news/national/coronavirus/researchers-develop-covid-19-study-you-can-participate-in-from-home

Cornerstone Partners in the News:

July 11, 2019: “Denver mom’s credit card used to pay for Uber trips without her knowledge” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), gives his take on how credit cards and banking information can be compromised. Here is the full article: https://kdvr.com/2019/07/11/denver-moms-credit-card-used-to-pay-for-uber-trips-without-her-knowledge/

July 2, 2019: “Hackers targeting Netflix, Hulu, other streaming services” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), explained to Denver Fox News why streaming service accounts are hacked, and he explains how an individual can stop it from happening. Here is the full article: https://kdvr.com/2019/07/02/hackers-targeting-netflix-hulu-other-streaming-services/

Cornerstone Partners in the News:

July 11, 2019: “Denver mom’s credit card used to pay for Uber trips without her knowledge” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), gives his take on how credit cards and banking information can be compromised. Here is the full article: https://kdvr.com/2019/07/11/denver-moms-credit-card-used-to-pay-for-uber-trips-without-her-knowledge/

July 2, 2019: “Hackers targeting Netflix, Hulu, other streaming services” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber), explained to Denver Fox News why streaming service accounts are hacked, and he explains how an individual can stop it from happening. Here is the full article: https://kdvr.com/2019/07/02/hackers-targeting-netflix-hulu-other-streaming-services/

Cybersecurity Consulting Services

Cyber Risk Assessment

Utilizing the NIST framework, our assessment approach is designed to identify… MORE

Open Source Intelligence Gathering

Open Source Intelligence refers to publicly available information that can be… MORE

Vulnerability Assessment

Our Vulnerability Assessment is designed to fit the needs and budget of your company. MORE

Education and Training

Our team’s combined knowledge makes us a perfect solution to educating your… MORE

Penetration Testing

A network penetration test takes the vulnerability assessment one step further. MORE

IT General Controls

Our services extend to SOX 404 ITGC outsourced audit services with 20 years of experienceMORE

Cybersecurity Consulting Services

Cyber Risk Assessment

Utilizing the NIST framework, our assessment approach is designed to identify… MORE

Penetration
Testing

A network penetration test takes the vulnerability assessment one step further. MORE

Education and Training

Our team’s combined knowledge makes us a perfect solution to educating your… MORE

Vulnerability Assessment

Our Vulnerability Assessment is designed to fit the needs and budget of your company. MORE

Open Source Intelligence Gathering

Open Source Intelligence refers to publicly available information that can be… MORE

IT General Controls

Our services extend to SOX 404 ITGC outsourced audit services with 20 years of experienceMORE

How weak are your users’ passwords?

We can help protect you against the usage of weak passwords and bad password hygiene in a safe and secure way. The first password check is free.

Cybersecurity Penetration Testing Services

A menu-driven penetration testing offering enables us to help any size company while staying within their budget to properly secure their environment.

       Services Provided        Objective  Benefits
Network Identify vulnerabilities and attempt to exploit from an external and internal approach.  Help to prevent unauthorized access to sensitive data on your company’s network.
Application Identify risks to web and critical business applications that could be exploited. Prevent the exposure of sensitive data and identify misconfigured security settings.
Physical Gain physical access to computers, servers, network equipment, and access points. Highlight vulnerabilities in processes and procedures that would let an outsider gain access to the internal network.
Wireless Identify and attempt to exploit wireless technologies such as 802.x, zigbee, Bluetooth, and more. Prevent outsiders from gaining access to your network and taking control of wireless technologies in use.
Social Engineering Utilize Open Source Intelligence gathering and reconnaissance to gain unauthorized physical or network access using social engineering techniques. Identify areas for improvement where training may be required.
Education and Training Educate your employees on industry best practices and conduct a phishing exercise to identify vulnerabilities. Reduce the risk of a cybersecurity incidents caused by phishing emails.

Call The Experts at CP Cyber Today

Call (720) 541-8910 now, or click below to email your questions.

Email Us