{"id":45707,"date":"2024-08-19T08:29:02","date_gmt":"2024-08-19T08:29:02","guid":{"rendered":"https:\/\/www.hkbnes.com\/web\/?page_id=45707"},"modified":"2024-09-09T07:32:01","modified_gmt":"2024-09-09T07:32:01","slug":"security-health-check","status":"publish","type":"page","link":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/","title":{"rendered":"Security Health Check"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"45707\" class=\"elementor elementor-45707\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-258cfcb5 e-flex e-con-boxed e-con e-parent\" data-id=\"258cfcb5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57390585 elementor-widget elementor-widget-text-editor\" data-id=\"57390585\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many security breaches stem from vulnerabilities overlooked or undetected by internal IT teams. Our Assessment Service utilizes a comprehensive Cybersecurity Framework, integrating NIST and other recognized frameworks, to identify gaps in your infrastructure. We recommend the most effective strategies to manage risks and ensure compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75733331 elementor-widget elementor-widget-button\" data-id=\"75733331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.hkbnes.com\/web\/contact-us\/?pid=45707&#038;tab=service\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3164d7dc e-flex e-con-boxed e-con e-parent\" data-id=\"3164d7dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-30226366 e-grid e-con-boxed e-con e-child\" data-id=\"30226366\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-39b5912f e-flex e-con-boxed e-con e-child\" data-id=\"39b5912f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bae0b7f elementor-widget elementor-widget-icon-box\" data-id=\"3bae0b7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tVulnerability Assessment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEvaluate the health of your IT systems and identify security risks. Through proactive penetration testing, we uncover potential vulnerabilities, providing a clear roadmap for remediation. <br><b>Ethical Hack Bot<\/b>: Our automated vulnerability assessment platform, powered by advanced bot technology, integrates multiple scanning tools to deliver an accurate cyber risk profile. Regular re-tests help enhance ongoing protection. <span class=\"btn-read more \"> ... <span class=\"text\">Read More<\/span> <svg width=\"6\" height=\"5\" viewBox=\"0 0 6 5\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M5.33464 1.33337L3.0013 3.66671L0.667969 1.33337\" stroke=\"#003D69\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/><\/svg><\/span><span class=\"hkbn_hide\" style=\"display:none;\"><br>- <b>Network Discovery<\/b> \u2013 Conduct network scans to understand and safeguard your IT landscape. <br>- <b>Vulnerability Scan<\/b> \u2013 Identify and categorize risks, prioritizing and crafting targeted remediation plans. <br>- <b>Analysis &amp; Recommendation<\/b> \u2013 Continuous monitoring and in-depth analysis yield insights and actionable recommendations. <span class=\"btn-read less \"><span class=\"text\">Read Less<\/span> <svg width=\"6\" height=\"4\" viewBox=\"0 0 6 4\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M5.33464 3.16669L3.0013 0.833354L0.667969 3.16669\" stroke=\"#003D69\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/><\/svg><\/span><\/span>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f1f342 elementor-widget elementor-widget-icon-box\" data-id=\"0f1f342\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWeb Application Scanning \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tGain comprehensive insights into the security status of your web and mobile applications through automated scanning of web servers, proxy servers, and web application servers. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41c03e1 elementor-widget elementor-widget-icon-box\" data-id=\"41c03e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tNIST Assessment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe US National Institute of Standards and Technology (NIST) security framework offers a flexible, repeatable, and prioritized method for risk evaluation, balancing performance and cost-effectiveness. Our extensive experience across various industries enables efficient identification and mitigation of cybersecurity risks. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49ab956c e-flex e-con-boxed e-con e-child\" data-id=\"49ab956c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73b9628 elementor-widget elementor-widget-icon-box\" data-id=\"73b9628\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPhishing Assessment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith phishing implicated in over 90% of security breaches, our Phishing Assessment service aims to protect your business. <br \/>- <b>Discover<\/b> \u2013 Assess and understand your company\u2019s threat profile, tailoring campaigns to test vulnerabilities related to email. <br \/>- <b>Simulate<\/b> \u2013 Execute simulated phishing attacks to pinpoint vulnerabilities. <br \/>- <b>Train<\/b> \u2013 Equip your team with the knowledge and skills necessary to safeguard your business. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74496b4 elementor-widget elementor-widget-icon-box\" data-id=\"74496b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWireless Network Assessment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tManage the risks associated with BYOD and protect your wireless LAN through detailed performance and security assessments. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efca020 elementor-widget elementor-widget-icon-box\" data-id=\"efca020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPenetration Test\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTo assess the robustness of your security measures, we conduct authorized cyberattacks on your IT environment, evaluating potential business risks. Our team of professional white hats holds credentials such as OSCP, CREST CRT, GWAPT, CISSP, and CISA, ensuring a thorough and professional evaluation of vulnerabilities across your web, mobile applications, and network.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96468a1 e-flex e-con-boxed e-con e-parent\" data-id=\"96468a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ca9fc8 elementor-widget elementor-widget-heading\" data-id=\"0ca9fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Related Solutions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-746b7eb e-grid e-con-full e-con e-child\" data-id=\"746b7eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-88ba268 e-flex e-con-boxed e-con e-child\" data-id=\"88ba268\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7208c91 e-flex e-con-boxed e-con e-child\" data-id=\"7208c91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61740f3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"61740f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"45\" height=\"44\" viewBox=\"0 0 45 44\" fill=\"none\"><path d=\"M28.167 34.8332H37.3337C38.3462 34.8332 39.167 34.0124 39.167 32.9998V10.9998C39.167 9.98732 38.3462 9.16651 37.3337 9.16651L8.00033 9.1665C6.9878 9.1665 6.16699 9.98732 6.16699 10.9998L6.16699 13.4443\" stroke=\"#2B93D1\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M6.16699 31.1665C8.19204 31.1665 9.83366 32.8081 9.83366 34.8332\" stroke=\"#2B93D1\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M6.16699 25.6665C11.2296 25.6665 15.3337 29.7706 15.3337 34.8332\" stroke=\"#2B93D1\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M6.16699 20.1665C14.2672 20.1665 20.8337 26.733 20.8337 34.8332\" stroke=\"#2B93D1\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e30e9fe elementor-widget elementor-widget-heading\" data-id=\"e30e9fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Connectivity<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0df4fb1 elementor-button-info elementor-align-justify elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"0df4fb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.hkbnes.com\/web\/solutions\/connectivity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"7\" height=\"12\" viewBox=\"0 0 7 12\" fill=\"none\"><path d=\"M1.25 10.5L5.75 6L1.25 1.5\" stroke=\"white\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3052d336 e-flex e-con-boxed e-con e-parent\" data-id=\"3052d336\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2da2a77a e-flex e-con-boxed e-con e-child\" data-id=\"2da2a77a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b21ef8c elementor-widget elementor-widget-heading\" data-id=\"2b21ef8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51d40d70 elementor-widget elementor-widget-heading\" data-id=\"51d40d70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Contact our experts today to schedule a consultation<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-385c329e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"385c329e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.hkbnes.com\/web\/contact-us\/?pid=45707&#038;tab=service\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Many security breaches stem from vulnerabilities overlooked or undetected by internal IT teams. Our Assessment Service utilizes a comprehensive Cybersecurity Framework, integrating NIST and other recognized frameworks, to identify gaps in your infrastructure. We recommend the most effective strategies to manage risks and ensure compliance. Contact Us Vulnerability Assessment Evaluate the health of your IT [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":47624,"parent":4939,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[],"class_list":["post-45707","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Health Check | HKBN Enterprise Solutions<\/title>\n<meta name=\"description\" content=\"Discover gaps of cybersecurity with our Assessment Service. We integrate NIST and other frameworks to provide risk management and compliance solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Health Check | HKBN Enterprise Solutions\" \/>\n<meta property=\"og:description\" content=\"Discover gaps of cybersecurity with our Assessment Service. We integrate NIST and other frameworks to provide risk management and compliance solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/\" \/>\n<meta property=\"og:site_name\" content=\"HKBN Enterprise Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hkbnes\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T07:32:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/08\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/\",\"url\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/\",\"name\":\"Security Health Check | HKBN Enterprise Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hkbnes.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg\",\"datePublished\":\"2024-08-19T08:29:02+00:00\",\"dateModified\":\"2024-09-09T07:32:01+00:00\",\"description\":\"Discover gaps of cybersecurity with our Assessment Service. We integrate NIST and other frameworks to provide risk management and compliance solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hkbnes.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hkbnes.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg\",\"width\":1920,\"height\":280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/security-health-check\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9875\",\"item\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/solutions\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Security Health Check\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/#website\",\"url\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/\",\"name\":\"HKBN Enterprise Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/#organization\"},\"alternateName\":\"HKBNES\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/#organization\",\"name\":\"HKBN Enterprise Solutions\",\"alternateName\":\"HKBNES\",\"url\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hkbnes.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/hkbnes_696x696.png\",\"contentUrl\":\"https:\\\/\\\/www.hkbnes.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/hkbnes_696x696.png\",\"width\":696,\"height\":696,\"caption\":\"HKBN Enterprise Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hkbnes.com\\\/web\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hkbnes\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/hkbnes\",\"https:\\\/\\\/www.youtube.com\\\/HKBNofficial\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Health Check | HKBN Enterprise Solutions","description":"Discover gaps of cybersecurity with our Assessment Service. We integrate NIST and other frameworks to provide risk management and compliance solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/","og_locale":"en_US","og_type":"article","og_title":"Security Health Check | HKBN Enterprise Solutions","og_description":"Discover gaps of cybersecurity with our Assessment Service. We integrate NIST and other frameworks to provide risk management and compliance solutions.","og_url":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/","og_site_name":"HKBN Enterprise Solutions","article_publisher":"https:\/\/www.facebook.com\/hkbnes","article_modified_time":"2024-09-09T07:32:01+00:00","og_image":[{"width":1920,"height":280,"url":"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/08\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/","url":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/","name":"Security Health Check | HKBN Enterprise Solutions","isPartOf":{"@id":"https:\/\/www.hkbnes.com\/web\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/#primaryimage"},"image":{"@id":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/08\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg","datePublished":"2024-08-19T08:29:02+00:00","dateModified":"2024-09-09T07:32:01+00:00","description":"Discover gaps of cybersecurity with our Assessment Service. We integrate NIST and other frameworks to provide risk management and compliance solutions.","breadcrumb":{"@id":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/#primaryimage","url":"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/08\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg","contentUrl":"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/08\/Website-revamp-Solution-Cybersecurity-LENT-Security-Health-Check_D.jpg","width":1920,"height":280},{"@type":"BreadcrumbList","@id":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/security-health-check\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9875","item":"https:\/\/www.hkbnes.com\/web\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.hkbnes.com\/web\/solutions\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/www.hkbnes.com\/web\/solutions\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Security Health Check"}]},{"@type":"WebSite","@id":"https:\/\/www.hkbnes.com\/web\/#website","url":"https:\/\/www.hkbnes.com\/web\/","name":"HKBN Enterprise Solutions","description":"","publisher":{"@id":"https:\/\/www.hkbnes.com\/web\/#organization"},"alternateName":"HKBNES","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hkbnes.com\/web\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hkbnes.com\/web\/#organization","name":"HKBN Enterprise Solutions","alternateName":"HKBNES","url":"https:\/\/www.hkbnes.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hkbnes.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/09\/hkbnes_696x696.png","contentUrl":"https:\/\/www.hkbnes.com\/wp-content\/uploads\/2024\/09\/hkbnes_696x696.png","width":696,"height":696,"caption":"HKBN Enterprise Solutions"},"image":{"@id":"https:\/\/www.hkbnes.com\/web\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hkbnes","https:\/\/www.linkedin.com\/company\/hkbnes","https:\/\/www.youtube.com\/HKBNofficial"]}]}},"_links":{"self":[{"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/pages\/45707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/comments?post=45707"}],"version-history":[{"count":2,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/pages\/45707\/revisions"}],"predecessor-version":[{"id":49928,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/pages\/45707\/revisions\/49928"}],"up":[{"embeddable":true,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/pages\/4939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/media\/47624"}],"wp:attachment":[{"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/media?parent=45707"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hkbnes.com\/web\/wp-json\/wp\/v2\/tags?post=45707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}