Most families and businesses have no idea what's lurking on their network. We scan every device, detect every threat, and tell you exactly how to fix it — in as little as 4 hours.
Professional-grade security assessments. No hidden fees. No "contact us for quote."
All Tier 1 plans include: 16-phase network + AI/ML infrastructure scan, 1 network location, unlimited rescans for 365 days, 15-20 page PDF report, security score (0-100), per-device remediation steps, network diagram, AI chatbot Q&A.
1-2 locations, up to 50 devices
10-50 employees
50-200 employees
200+ employees
Four simple steps from purchase to report. Get results in hours, not weeks.
Choose your assessment level and pay securely via Stripe. No sales calls. No proposals.
After payment, click "Start Assessment" then download our scanner app. Connect to your WiFi and run it.
First scan locks this assessment to this network for 365 days
• Download for Windows or macOS (Apple-notarized)
• No WiFi password needed
• 16-phase scan discovers 95%+ of devices
The scan takes 5-10 minutes. You'll see a progress bar, network name, and device count.
When the scan completes, click "Upload Results" to send for analysis. Your report arrives based on your selected tier (as fast as 4 hours).
No account? Create one
By signing in, you agree to our Terms of Service and Privacy Policy. We never share your data with third parties without your consent.
Have an account? Sign in
By creating an account, you agree to our Terms of Service and Privacy Policy. We never share your data with third parties without your consent.
Manage your assessments
Everything you need to know about using CyberSecurityPA
Choose your assessment tier and privacy model. Complete checkout with Stripe.
Download our scanner app. Run it on your network. Results upload automatically.
Receive your professional security assessment via email (as little as 4 hours, 24-48h max — same delivery time for all tiers). At the $399 and $599 tiers, a security expert reviews your scan report on request with a 3-5 business day turnaround per review; primary communication is email, with phone or text available by mutual agreement.
Enterprise-grade 16-phase security scan with comprehensive vulnerability detection and remediation guidance.
Best for: Most users - complete assessment at an accessible price
Everything in Full Assessment, plus 2 expert reviews: a security expert reviews your scan report and shares their analysis. Email by default; phone or text available by mutual agreement. 3-5 business days per review.
Best for: Customers who want a security expert to review their report with them
Everything in Full Assessment, plus 6 expert reviews: a security expert reviews your scan report and shares their analysis. Email by default; phone or text available by mutual agreement. 3-5 business days per review.
Best for: Customers who want extended expert review across their initial scan and rescans
Typically 3-8 minutes depending on your network size and number of devices. The scanner runs 16 phases including device discovery, port scanning (1,050+ ports), vulnerability validation with EPSS exploit scoring, credential testing, TLS cipher analysis, WiFi security assessment, and external exposure detection.
Tier 1 assessments are limited to one network location. For multiple locations, contact us about Tier 2+ options.
Yes. All data is encrypted with AES-256 in transit and at rest. Built on SOC 2 Type II certified infrastructure (AWS, Google Cloud).
Yes, you can rescan the same network anytime within your assessment's validity period (1 year).
The scanner detects computers, phones, tablets, smart TVs, cameras, NAS devices, printers, routers, smart speakers, and 14+ IoT device types using mDNS, SSDP, ARP, ICMP, and TR-064 gateway queries.
Executive summary, risk score, device inventory, CVE vulnerabilities with EPSS exploit probability scores and CISA KEV validation, TLS/SSL cipher analysis, WiFi encryption assessment, external exposure findings, weak protocol findings, router security with UPnP and DNS details, default credential issues, IoT security analysis, traffic analysis results, and prioritized remediation steps.
Yes. The desktop scanner tests for default credentials on SSH, Telnet, FTP, SMB, MySQL, PostgreSQL, Redis, MongoDB, HTTP admin panels (50+ paths), and SNMP community strings (27+ defaults).
Yes. The scanner covers 11 AI/ML services (Jupyter, Ollama, MLflow, TensorBoard, Gradio, Streamlit, Qdrant, Milvus, Ray, Triton, TorchServe) with 16 AI-specific vulnerability checks — detecting exposed notebooks, unauthenticated model servers, data leakage from ML artifact stores, and other AI infrastructure risks.
The scanner monitors DNS queries and network connections to detect suspicious activity like malware callbacks, data exfiltration attempts, and connections to known threat intelligence indicators.
If you're unsatisfied with your assessment, contact us within 7 days for a full refund.
General Support:
support@cybersecuritypa.com
Response Time:
Within 24 hours on business days
Last updated: December 16, 2025
We collect network scan data and account details to provide assessments. Data is encrypted and never sold. All assessment tiers use AI analysis via Google Gemini API to produce your scan report. The +2 Expert Reviews and +6 Expert Reviews tiers additionally include human-expert Q&A via email.
Last updated: December 16, 2025
Authorized Scanning: Only scan networks you own or have permission to scan.
Network Lock: Tier 1 is locked to one network location for 365 days.
Refunds: Available within 7 days if no scan completed.