Healthcare & Medical IT

  • Review security of HIPAA, PII and PHI records
  • Review accessibility and encryption of medical records in motion
  • Provide remediation assistance for HIPAA violations
  • More than a network review. Assure that business systems and Web Applications meet security and HIPAA standards

Department of Defense Contractors

  • Full NIST 800-171 program
  • Assistance responding to client questionnaires or NIST documentation.
  • Assistance with building or maintaining your POAM or SSP
  • Risk Assessments, Incident Response Program Development
  • Vulnerability Evaluations and Vulnerability Management Program.

Financial Services

  • Assistance, planning and programs for SEC and New York State Department of Financial Services cyber security requirements
  • Defined service offerings that support Banking, Accounting, Investment, Wealth Management and Fund based organizations
  • Policy creation, security program creation, audits, vulnerability evaluations and penetration testing

IT Service Organizations

  • Ethical Intruder has partnered with many service organizations to expand their core offerings into security segments their clients are requesting
  • Assist IT Service organizations and MSP’s whose clients are looking for compliance reviews, policy creation, vulnerability assessments, penetration testing or social engineering training
  • Independent 3rd party reviews for clients of service providers. This offering allows service organizations a way to strengthen their own programs by utilizing the best practices found in the evaluations across their entire customer base.


  • Review customer profiles stored online
  • Review security and improvements for online purchasing
  • Review customer history and PII stored online
  • Provide PCI guidance and identify vulnerabilities

Software Products & Services

  • Companies want to make sure the products they sell do not have security holes that will hurt their reputation
  • Review if product releases are being rushed to market before bugs and security are addressed
  • Assure hosted cloud products and services are secure for customers


  • Assist with technology review when an internal focus on security may be lacking
  • Review concerns regarding keeping donors private
  • Review concerns about credit card payment security

Looking for more information?

Have questions, need more information or want to better understand how we can help with your Cyber Security or Compliance needs?

Healthcare IT Spotlight

Ethical Intruder works with customers across various industries. Over the past several years we have experienced substantial growth in the Healthcare IT and Life Sciences space. During this period we have performed analysis and evaluations for clients and their connected partners:

  • Medical Device Companies
  • State Departments of Health
  • Major Hospitals
  • Major Health Insurers
  • Health Insurance Brokers
  • Healthcare IT Products and Services
  • Life Science Companies