Your client data is one of the most valuable assets in your firm. Discern whether your data is safe, secure, and meets the current regulatory standards.

Make visible the invisible. Understand your vulnerabilities and set a plan to secure your data.

As regulations and compliance issues regarding your firm's Information and Security systems become more complex, uncovering and addressing information security issues before an incident occurs can be vital. Xcentric offers a comprehensive suite of services that guarantees your firm an improved security posture. Starting with the assessment phase, we will help you identify vulnerabilities in your network and provide you with an action plan to address them. Once the assessment phase is complete we can help validate your remediation efforts by performing external and internal penetration testing. To ensure that your security efforts maintain a positive direction we also offer security awareness training so that your users can do their part to ensure the security of your information assets.

Our services can be utilized to aid in regulatory compliance with:

• The Sarbanes-Oxley Act, Section 404
• Payment Card Industry Data Security Standard (PCI DSS)
• The Gramm-Leach Bliley Act (GLBA)
• The Health Insurance Portability and Accountability Act (HIPAA)

Vulnerability Assessments

Identify and prioritize the both the internal and external vulnerabilities that exist in your infrastructure so that a remediation plan can be set in motion.

Penetration Testing

We use cutting-edge tools to mimicking the activity of a determined hacker, identifying the potential weak spots in your perimeter defenses. You will receive a report that details the specific areas of concern and a prioritized checklist to address them.

Social Engineering Testing

The human element of your company’s security may be tested along with your fixed information systems. These tests are tailored to your objectives and highly customized to fit your firm's situation.

Risk Assessment and Information Security Program development

We consult with management to assist in analyzing the systems and risks within the organization and determining critical applications and safeguards. We can facilitate development of the organization’s Risk Management Program, as may be necessary to comply with regulatory guidelines.

Policy Review

Your security policy documents should be living documents evolving as your firm grows and as technology changes. We will ensure that the necessary policies exist and that existing policies do not hinder the business process.

To learn more about Xcentric Security Assessment services, complete the 'Ready to Learn More' form on the right. Or, you may contact info@xcentric.com or 678-297-0066, option 2.


Best practices learned from real-world experience in the accounting profession.
See our resources Our Resources

Get in touch to learn more

or give us a call:
Signup for our newsletter
© 2017 Xcentric. All rights reserved.
Privacy Policy