Microsoft Access Data Breach Discovery and Assessment
Learn how to perform a discovery and assessment of your business user’s database of choice
Help4Access’ Microsoft Access Data Breach Assessment Provides:
Discover Threat Potential
The consequences of a data breach can be catastrophic. Patient records, trade secrets, strategic KPIs, R&D product features and intellectual property records are being kept in vulnerable MS Access databases at all levels within an enterprise.
To achieve a satisfactory level of security, IT departments acknowledge the importance of migrating to a central robust platform such as Microsoft SQL Server. However, this is no small feat. Microsoft Access database files are difficult to discover and their threat severity harder to assess.
Help4Access will walk you through their winning playbook, useful for any size company, demonstrating a proven process, tools and risks to avoid.
Assess Threat Severity
During our walk-through of the processes involved in performing a discovery and assessment, we’ll cover why Microsoft Access databases pose a serious security risk, the scope of network access and personnel required to perform a full network sweep, the typical high risk characteristics to look for, the divide and conquer technique used to narrow down the suspects, how the complexity rating KPI is calculated and how it correlates to risk, and with the most severe risks uncovered, we’ll look at several techniques used to identify key stakeholders in a large enterprise environment. Armed with this information, we’ll move to discuss: migration planning, testing, deployment and why continued network monitoring is advised.
Considerations for the Future
Help4Access’ Microsoft Access Data Breach Discovery and Assessment helps prepare for an entire network discovery, assessment, stakeholder communication plan, migration planning and testing, implementation and continued environment monitoring.
What works for you and your team? Depending on your availability and requirements, we can meet with you as soon as possible, or in the near future.
This introduction may be conducted remotely or on site.
Recommended Attendee Titles
If you are not the business owner and/or key decision maker, please ensure they are present; business operations/decisions are directly tied to technology requirements for most organizations. We also recommend having these key team members present:
Preferred Documentation to Review
We recommend, you request from your system administrators a preliminary Microsoft Access asset inventory list created to include size of file, date last opened, filename and path.
Timeline at a Glance
Pre-Introduction: Schedule kick-off call, establish priorities
Kick-Off Call: Introductions, agenda, expectations
Final Review: Help4Access provides Executive Summary including recommendations, action items and estimated timelines