Managing Information Security Risks

As the threat of cyber intrusions increases, organizations are doing more to prevent, protect against, and anticipate these threats.  911.net is A.J. Boggs & Company’s computer security group. We specialize in cybersecurity security assessments including vulnerability assessments and scans, cybersecurity insurance, and secured hosting infrastructure.

An organization must maintain a robust and attack-resilient infrastructure in order to successfully defend against cyber attacks. AJ Boggs offers a comprehensive assortment of vulnerability / risk assessment services that allow businesses to identify critical security vulnerabilities that attackers could exploit. These services will help your organization improve its existing security posture while reducing the risk of a successful attack.

AJ Boggs can help create a cybersecurity solution that meets the unique needs of your organization. 911.net cybersecurity solutions include threat, risk and vulnerability assessments based upon the NIST’s Risk Assessment Guidance, SP-800-30.

For more information please contact info@911.net



  • External Vulnerability Assessment
  • External and Internal Vulnerability Assessment


  • Vulnerability Scans
  • System Assessment
  • Recommendations for mitigation of risk
  • Preparation of risk matrix and assessment documentation to highlight gaps and threats


  • Security Assessments
  • System review
  • Internal vulnerabilities analysis
  • Penetration test (limited scope)


  • Advanced Security Assessments
  • Monthly vulnerability scanning of servers
  • “Honey Pot” servers to detect & stop attacks

Our Approach

  1. Preparation (scope, data collection/system characterization) – Identify the scope of the assessment, all instances of sensitive information/data (wherever it can be stored, processed, or transmitted) and system boundaries.
  2. Threat Sources and Events Identification – Identify human and nonhuman threat sources and events that can have an adverse impact on sensitive information/data.
  3. Vulnerability Identification – Identify vulnerabilities with the potential for exploitation by threat sources through specific threat events.
  4. Likelihood/Impact Analysis – Determination of the likelihood a vulnerability may be exercised and the resulting impact to the confidentiality, integrity and availability of sensitive information/data.
  5. Risk Determination – Determination of risk magnitude taking into consideration likelihood, impact and current or planned mitigating controls.
  6. Assessment Maintenance – Maintain and update the risk assessment as the environment changes.