Cybersecurity Risk & Vulnerability Assessments

We offer three types of cybersecurity assessments to meet different needs: Security Assessment Review (SAR) for third-party vendors, Cybersecurity Risk Assessment for USNH-owned systems, and Vulnerability Scanning for application development sites.

Security Assessment Review (SAR):
For third-party technology vendors handling USNH data. This review ensures vendors comply with USNH policies and standards when storing or processing university information on their systems.
Request this if your vendor will manage USNH data externally.

Vulnerability Scan:
A scan of development websites to identify security weaknesses before production deployment.
Request this to check your app’s security before going live.

Cybersecurity Risk Assessment:
A comprehensive review of your USNH-owned and ET&S-managed IT system to identify and evaluate potential risks from hardware, software, or processes, with recommendations to control or eliminate threats.
Request this if you suspect your system may be at risk.

 
Request Service

Related Articles (1)

This article contains information about vendor information security, privacy considerations, and security assessment review (SAR) for USNH community members engaged with vendors involved with USNH information technology resources. The purpose is to guide USNH community members regarding vendors and/or third-party partners that provide products or services that integrate with the USNH network.