Get the answer in 24 hours!
Not comfortable with AI analyzing your data? We offer three delivery models so you can choose what works for your industry and privacy requirements.
Full scan data analyzed by AI
Best for: General business, non-regulated industries, fastest delivery needed.
Only metadata sent to AI (counts, categories)
Best for: Privacy-conscious customers, lightly regulated industries.
100% human analysis, no AI whatsoever
Best for: Healthcare (HIPAA), legal, government contractors.
AI-Free assessments include compliance attestation: "This assessment was performed entirely by certified human analysts."
Our platform adapts to your industry with tailored questionnaires, compliance requirements, and recommendations.
PCI-DSS, POS security
HIPAA compliance
Client data protection
SOC 2, data security
E-commerce, PCI-DSS
FERPA, student data
Donor data security
Remote work security
24-48 hour delivery vs 6-8 weeks. Critical vulnerabilities fixed weeks sooner.
75-90% below traditional consulting. Professional-grade at accessible prices.
Price shown upfront. No "contact us for quote." No hidden fees.
AI-First, Limited-AI, or AI-Free. You choose your comfort level.
Professional-grade security assessments. No hidden fees. No "contact us for quote."
All Tier 1 plans include: 1 network location, unlimited rescans for 365 days, 15-20 page PDF report, security score (0-100), remediation guidance, network diagram.
1-10 employees
10-50 employees
50-200 employees
200+ employees
Four simple steps. Report in 24-48 hours.
Choose your privacy level and pay securely via Stripe. No sales calls. No proposals.
After payment, click "Start Assessment" then download our scanner app. Connect to your WiFi and run it.
First scan locks this assessment to this network for 365 days
• No software to download - runs in your browser
• No WiFi password needed
• Works on desktop, laptop, or mobile
The scan takes 5-10 minutes. You'll see a progress bar, network name, and device count.
When the scan completes, click "Upload Results" to send for analysis. Your report arrives via email in 24-48 hours.
No account? Create one
By signing in, you agree to our Terms of Service and Privacy Policy. We never share your data with third parties without your consent.
Have an account? Sign in
By creating an account, you agree to our Terms of Service and Privacy Policy. We never share your data with third parties without your consent.
Manage your assessments
Everything you need to know about using CyberSecurityPA
Choose your assessment tier and privacy model. Complete checkout with Stripe.
Download our scanner app. Run it on your network. Results upload automatically.
Receive your professional security assessment via email (AI-First: 24-48h, Limited-AI: 3-5 days, AI-Free: 5-7 days).
Fastest delivery. Your scan data is analyzed by our AI (Google Gemini) for comprehensive threat detection.
Best for: Quick results, maximum insight
Hybrid approach. AI assists with analysis, but a human security analyst reviews and finalizes the report.
Best for: Balance of speed and human oversight
No AI processing. Your data is analyzed entirely by human security professionals.
Best for: Maximum privacy, regulatory compliance
Typically 3-8 minutes depending on your network size and number of devices. The scanner runs 14 phases including device discovery, port scanning, and security checks.
Tier 1 assessments are limited to one network location. For multiple locations, contact us about Tier 2+ options.
Yes. All data is encrypted with AES-256 in transit and at rest. We use SOC 2 compliant infrastructure.
Yes, you can rescan the same network anytime within your assessment's validity period (1 year).
The scanner detects computers, phones, tablets, smart TVs, cameras, NAS devices, printers, routers, smart speakers, and 14+ IoT device types using mDNS, SSDP, and ARP protocols.
Executive summary, risk score, device inventory, CVE vulnerabilities (including CISA Known Exploited), router security findings, default credential issues, IoT security analysis, and prioritized remediation steps.
Yes. The desktop scanner tests for common default credentials on SSH, Telnet, FTP, SMB file shares, and databases (MySQL, PostgreSQL, Redis, MongoDB) to identify potential unauthorized access risks.
Yes. The scanner identifies 74+ AI/ML services including Jupyter notebooks, Ollama, MLflow, TensorFlow Serving, and other AI infrastructure that may pose security risks if exposed on your network.
The scanner monitors DNS queries and network connections to detect suspicious activity like malware callbacks, data exfiltration attempts, and connections to known threat intelligence indicators.
If you're unsatisfied with your assessment, contact us within 7 days for a full refund.
General Support:
support@cybersecuritypa.com
Response Time:
Within 24 hours on business days
Last updated: December 16, 2025
We collect network scan data and account details to provide assessments. Data is encrypted and never sold. AI-First/Limited-AI models process data via Google Gemini API. AI-Free model uses no AI.
Last updated: December 16, 2025
Authorized Scanning: Only scan networks you own or have permission to scan.
Network Lock: Tier 1 is locked to one network location for 365 days.
Refunds: Available within 7 days if no scan completed.