Flex Protection Logo

Your Systems And Critical Data Are At Risk Of A Cyber Attack

See The Big Picture With The Groundbreaking Risk Assistant Tool

Show your management or clients that you are taking action to reduce cybersecurity risks, and to implement best practices.

Use your private cloud-based Risk Assistant tool to import common risks and add additional threats you may face. Deploy effective defensive measures to reduce and track overall risk. Use your personal dashboard to manage your exposure and your flexible preventative measures.

Start identifying, tracking and evaluating your risks, and taking counter-measures. Please complete the short form below.

Software and data to track risks and threats

View A Short Demo: Complete this confidential form to see a demo of the Risk Assistent cybersecurity management tool.


Enroll in the Data Defender program instead

Poor security can be stressful.

Tracking Cyber Threats Can Be Exhausting

Users can work with confidence.

Risk Assistant Provides Peace of Mind

Example Risks from Risk Assistant Database

  • Social Engineering attacks
  • Shared passwords
  • Poor password management
  • Ransomware attacks
  • End-of-life system software
  • Invalid input in web application
  • Default Login and Password on devices
  • Unsecured IOT devices
  • User awareness training stale, forgotten
  • Improperly configured user accounts
  • Weak encryption
  • Buffer overflow
  • Non-updated machine as attack pivot point
  • Third party unmonitored network access
  • Unauthorized VPN access
  • Unauthorized RDP access
  • Improper certificate & key management
  • Post-incident weak or ineffective response

Defensive Measures from Risk Assistant Database

  • Documented, comprehensive Information Security Policy
  • Overall Risk Assessment by qualified third party
  • Current inventory of data stores: where, how accessed, how protected
  • Current inventory of hardware devices: data stored, how protected
  • Web Application vulnerability scan with ZAP or similar
  • Network vulnerability scan with NESSUS or similar
  • Airgap - physically separate critical data stores
  • Keep operating systems version current
  • Automated full or differential backups for server data
  • Validate all user input before using
  • Audit and correct default ID/Password on all devices
  • Inventory and Secure IOT devices
  • User awareness re-training
  • Audit and verify need for all accounts
  • Cipher Suite (protocol, length, hash)
  • Update all virtual/physical devices regularly
  • Formal certificate process, plan, issuer, intermediate, responsibility
  • Incident Response Plan

Flex Protection Logo

Copyright 2023 National Training Systems 3903 Northdale Blvd Ste 100E Tampa FL 33624  --  Training provided by FlexTraining