Computer Repair & Business IT

Vulnerability Assessment

A comprehensive study of an entire information system, seeking potential security weaknesses


Vulnerability assessments have many similarities with risk assessments. Assessments are usually carried out using the following steps

  • Cataloging system assets and capabilities
  • Assigning an order to cataloged resources based on value and importance
  • Identifying  vulnerabilities or potential threats to each resource
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable resources


Organizations that use these assessments are aware of security risks and understand they need help identifying and prioritizing potential issues. By understanding their vulnerabilities, an organization can formulate solutions and patches for those vulnerabilities for incorporation with their risk management system (Techopedia)

If you are concerned about the security of your system get in touch with us at Solveit


<script class=’CspSyndicationScript’ type=’text/javascript’ src=’’></script>
<div class=’showcase’></div><a href=’’ class=’SEOLink’ style=’font-family:Arial,Helvetica,sans-serif;font-size:11px;color:#777;text-decoration: none;’>Webroot</a>

SolveIt News & Updates

  • Webroot SecureAnywhere
    Webroot SecureAnywhere
    Looking for a compact efficient Antivirus? Look no further The threat of cyber-crime...

SolveIt Newsletter

Signup for our Newsletter

Our Office Address

Solve IT

Gurtnafleur Business Park,
Clonmel, Co. Tipperary.

Phone: +353 52 619 0000