Let's Start a Conversation

Success! Message received.

Sample Internet Security Assessment Report

Security Assessment

Authorization Form

Security Assessments For Government Agencies

The hacker threat to your Government Agency

Government agencies are particularly susceptible to hacking attacks.  Beyond the standard hacker threats, governments have local threats from disgruntled constituents, contractors, unions,  employees, and anarchists.  As the head of your local township, city, county or town, it is imperative that you secure all your Information Technology Assets. 

Your regular IT personnel should not do this testing

Your regular IT staff, even if supremely competent, cannot really test your systems adequately.  Since they built your network, they may be blindsided by attack types that they did not consider, or were not aware of.  Only an outside organization can truly test your network, and with Dominant Systems' 15 years of experience doing Network Security Assessments, you'll be able to rest assured that competent network security professionals have tested, analyzed, and made recommendations to improve your network security.


Your Fiduciary Duty to your constituents

As the head of your government agency, you have a fiduciary duty to keep your organization's data safe.  Failure to do so can result in election recalls, impeachment and even possible criminal charges. While it's true that even the best hacker defenses can be circumvented, by showing that your organization is undergoing regular security assessments, you show your commitment to the security of your network. This can go along ways towards showing that you are doing what is needed to keep your government agency safe from outside hackers. 


Rinse and repeat.

Because threats to your network change over time, it is important to maintain vigilance. Depending on your security requirements, you will want to consider quarterly or yearly assessments.

The methodology.

To defeat hackers, you must think like a hacker. Our proprietary process uses a number of open source and commercial hacking tools, vulnerability analyzers, and methodologies to identify vulnerabilities that could be exploited by entities seeking to gain access to your system via the internet.  Please keep in mind that WE NEVER ATTEMPT TO ACTUALLY BREACH YOUR SYSTEMS so everything remains above-board. 


Our experts analyze your results, and prepare an executive-style report featuring:

  • A listing of all vulnerabilities, errors, and issues found including:

    • Detailed description of each problem;

    • Severity grade for each problem;

    • Honest opinions and detailed suggestions for remediation.

  • An overall grade is also given for the entire assessment:

    • Grade is based on our experience with networks similar to yours as well as the number and severity of vulnerabilities found;

    • Grades range from A through F.

Why use a 3rd Party for Security Assessments?

Many modern networks consist of layers of different technologies installed over time, often by different vendors and/or internal staff. This can make it easier for hackers to exploit unpatched and/or unsupported systems.  Without an actual test, it is impossible to know how well a network can defend itself against attack.

How much does it cost?

The cost is based on the number of internet-facing IP numbers that will be tested.​


Assessment Service

  • The first IP number costs $2995. 

  • Each additional IP number cost $275.

Penetration Testing

  • The first IP number costs $8995. 

  • Each additional IP number cost $750.

Order Your Security Assessment.

Ordering an Internet Security Assessment is easy and takes only 3 steps.​

Step 1 - Decide whether you want a Penetration Test or just an Assessment.  Penetration testing will give you a better idea of how vulnerable you are. The Assessment is less expensive because we don't actually try to penetrate your network.

Step 2 - Calculate your cost. See above for current pricing

Step 3 - Download and sign the​ Internet Security Assessment Authorization form.
Be sure to include the actual IP numbers to be tested on page 2 of the form.

Step 4 - Email us a copy of the signed and completed form together with your PO.
If you wish to pay by credit card, please call 734-971-1210, and ask for accounting.

That's it.  You will receive your report typically within 15 business days. For security purposes, the report is sent via encrypted email and the encryption key is sent via text message to a cell phone you designate.

What to do if you are hacked

This depends on what sort of attack is occurring.  For attacks like the crypto-locker worm which encrypts all the data that an infected system can access, you will want to immediately shut down any infected systems, including servers.  Other types of security incidents are handled differently.  For attacks in progress, we strongly recommend that you immediately call our 24x7 emergency hotline at +1.734.971.1210. Experienced network security personnel will handle your call via phone, remote access, or onsite visit. Once we stop the carnage, we can help you recover corrupted systems, replace obsolete firewalls and security systems, and do post-mortem analyses to see what went wrong. Dominant Systems has been helping customers recover from security and related computer network disasters for over 25 years.

Remediation Services

If your current team is unable to fix any of the problems we found in our assessment, our Security Professionals are available on a time and materials basis for consulting or actual fixing of the problem(s). Please call +1.734.971.1210 for immediate attention.