"You Dream. We Build".


Sometimes It's about what you don't know and that's why in most cases companies were never aware of what hit them. A comprehensive IT security risk assessment can prevent breaches, reduce the impact of realized breaches, and keep your company's name from appearing in a negative spotlight.

Many states are now enacting data breach notification laws, New York will require all financial institutions to not only conduct an IT Risk Assessment but regulations will require each company to assess its specific risk profile and design a program that addresses its risks in a robust fashion and no longer will senior management be able to "play dumb" the laws will mandate that they must take this issue seriously and be responsible for the organization’s cyber security program and file an annual certification confirming compliance with these regulations.

Any business or public entity required under this section to disclose a breach of security of a customer's personal information shall, in advance of the disclosure to the customer report the breach in security. And any information that pertains to the violation of the Division of State Police. This violation may be in the Department of Law and Public Safety for investigation or handling, which may include dissemination or referral to other appropriate law enforcement entities.

Expanded effective January 1, 2014, defines the qualifying conditions that constitute a breach of an individual’s personal information, as well as the actions that must be taken if such a security breach occurs. The law applies to any business that operates in the state of California. It doesn't require a nexus (physical presence) in the state; if you have customers in California, the law applies to your business. Therefore, if you have a national customer base, it’s likely that you’re subject to the amended law.

Maze Can provide a cost-effective IT Security Risk Assessment for your small - to medium- sized businesses or organization:

Network Vulnerability Assessments

  • Identifies network security risks and vulnerabilities
  • Offers a snapshot of an organization’s network security posture
  • The dedicated baseline for future network security in Network Penetration Test

Network Penetration Testing

  • We inspect the risk by exploiting identified security threats and vulnerabilities
  • Validates current network security posture and countermeasures
  • Validates all threat risks associated with identified network differences and misconfigurations

Enterprise Threat Assessment

  • Analyzes an organization’s risk based on technical, physical and non-technical testing
  • We analyze all critical resources related to IT risk to identify ongoing issues and future initiatives.
  • Develops a prioritized remediation plan based on the analysis of an organization’s security risk

Additional Value

The result is a complete view of your overall security posture. We prioritize and identify differences based on their impact on your business. We also recommend actionable safeguards that anticipate and counter threats so that you can protect all of your electronic assets and the continuity of your business, while also ensuring Regulatory Compliance. With an office in New York City, we can cover the areas where you do business.

Contact Us Today to Schedule a Conversation