Effective Information Security Starts Here
CityBannerRed.png

Home

Service. Integrity. Compliance.

 

We help small and midsize businesses identify security gaps, strengthen IT controls, and reduce business risk.

Red Thorn Security Group has more than 40 years of Information Security experience working with the top U.S. Intelligence Agencies and private industries.   

Red Thorn offers information security program and system audits, risk assessments, and penetration tests based on the National Institute of Standards and Technology (NIST) and Federal Financial Institutions Examination Council (FFIEC) frameworks. We focus on insurance agencies, supply chain, critical infrastructure, and financial industries but can provide services for any organization looking to improve its information security program.  

At Red Thorn Security Group, we understand the importance of protecting your business from cyber threats. As a veteran-owned cybersecurity consulting company, we specialize in providing comprehensive security solutions to businesses of all sizes. Our team has over 40 years of combined experience within the Intelligence, Information Security, and Cybersecurity industries.

Our services include information security audits, risk assessments, penetration testing, and policy templates.

Don't wait for a security breach to occur, take action now and contact us today to learn more about how we can help you secure your business.

Red Thorn provides its services across the Savannah, Georgia; Charleston, South Carolina; and Jacksonville, Florida regions, with the capability to offer remote services spanning the entire United States.

Contact us today

 

Featured Services

Effective security is layered, therefore, each part of our services are meant to build on the others and together they give your organization the fullest ability to protect the sensitive information contained in your information systems.


Information Security Audit

Red Thorn Security Group provides in-depth information security audits based on the NIST Cybersecurity Framework (CSF) and FFIEC IT Examination Handbook. Red Thorn’s goal is to help organizations identify information system shortcomings so that the organization can effectively mitigate the risk of attack from the many nefarious individuals who seek to exploit vulnerable information systems.

Risk assessment

Red Thorn performs risk assessment based on the NIST Cybersecurity Framework (CSF). After an information security audit, an accompanying risk assessment can help an organization build a plan to protect the organization based on a process of implementing the most important controls with the most significant threat first.

Virtual CISO (vCISO)

A vCISO, or Virtual Chief Information Security Officer, provides strategic cybersecurity leadership on a flexible, outsourced basis. This service helps organizations strengthen their security program by identifying risks, guiding security priorities, improving policies and controls, supporting compliance efforts, and advising leadership on how to protect the business. Red Thorn Security Group offers this practical option for companies that need experienced security oversight but are not ready to hire a full-time CISO..


 
For every problem, there is a solution which is simple, neat, and wrong.
— H. L. Mencken
 

 

Let's Chat.

Use the form below to contact us regarding your inquiry. Please be as detailed as possible. Include your industry along with any specific needs.