Data Breach Risk Scan

The Data Breach Risk Scan contains details of any discovered vulnerabilities and unprotected data, along with the Potential Liability monetary value of any data loss.

Device Details

Contains information on when the Assessment completed, the host name, its IP address and platform. To export the report, click the PDF version button.

Unprotected Data Summary

Contains a graph displaying the Unprotected Data type count. For example credit cards, dates of birth, driver licenses, social security numbers etc. Along with how long the scan took to complete, the number of files that were scanned, the number of files that contained a violation, the total number of unique violations. Finally, we display the Potential Liability amount. This is based on the information entered in the General Section of the policy applied to the device.

Vulnerability Summary

The Vulnerability Summary graph shows the vulnerability count by severity based on the Common Vulnerability Scoring System (CVSS) with each vulnerability assigned a severity of High, Medium or Low and percentage of vulnerabilities by vendor.

To break down this information click, on the details links to take you to the "Vulnerability Details" sections.

Details about Scoring

A vulnerability with a High level of severity will fail PCI compliance whereas vulnerabilities with Medium or Low severity levels will generally pass PCI compliance.

  • High: 7.0 - 10.0
  • Medium: 4.0 - 6.9
  • Low: 0.0 - 3.9

Unprotected Data Details

Lists the discovered files that contain unprotected data. Use the filters at the top of the section to focus on particular data types. For example, Bank details, Cards, Date of Birth, Licenses and Social Security numbers. Note, these filters only apply to the current page and are not retained between sessions.

Expand each entry to view additional information or expand all rows.

When expanded, the entry shows the file hash as MD5, SHA1 and SHA256. All user groups who have access to the file. A masked list of violations found in the file. No unmasked data leaves the scanned system.

You also have the option to generate a batch file to run on the computer and permanently delete the files. Click on Create File Removal Script, tick the boxes against the entries to delete then click Download File.

Unprotected Data Scan Statistics

This section displays the time it took to run the scan, volumes scanned, number of files scanned, number of files with suspect data, suspected instances found etc.

Vulnerability by Vendor Details

Lists the vulnerabilities discovered by vendor click on a vulnerability in this section to go to its entry in the Vulnerability Details section. This list details of the discovered vulnerabilities along with links to external sites that with instructions on how to alleviate the issue.

Vulnerability Details

List details of the discovered vulnerabilities along with links to external sites with instructions on how to alleviate the issue.

Network Port Details

Displays the listening TCP/IP ports on your system. These listening ports indicate that a service is listening for external communication from a remote computer.

From here you can review the list of open ports, determine if they are required and disable any unnecessary services to reduce the exposure to compromise from malware or attackers.

We have also included a button to open the Internet Assigned Numbers Authority at the service name and port numbers page.

>

Please note, we are not responsible for the content of external sites.

What do you want to do?