Proprietary Framework

FACHT: Free Assessment of Current Hacking Threats

PTG's proprietary cybersecurity assessment uncovers compromised credentials, exploitable vulnerabilities, and compliance gaps across six critical security domains -- at no cost and with no obligation. Serving the Research Triangle since 2002.

CMMC Registered Practitioner Org | BBB A+ Since 2003 | 23+ Years Experience
Six Assessment Domains

What the FACHT Covers

Every FACHT evaluation examines six critical security domains to deliver a complete picture of your organization's risk exposure.

Dark Web Exposure Scan

Search thousands of underground forums and breach databases for compromised credentials, leaked email addresses, and stolen data tied to your organization.

Network Vulnerability Analysis

Evaluate external-facing infrastructure for open ports, misconfigured services, outdated firmware, weak encryption, and exploitable software vulnerabilities.

Email Security Assessment

Examine SPF, DKIM, and DMARC configurations along with phishing defenses to determine whether attackers can spoof your domain.

Endpoint Protection Review

Evaluate device security across your fleet -- EDR deployment, patch management, mobile device policies, and administrative privilege controls.

Compliance Gap Check

Assess readiness against frameworks most relevant to your industry: CMMC, HIPAA, PCI DSS, SOC 2, NIST 800-171, and more.

Executive Risk Report

All findings translated into clear business language with a visual risk dashboard and prioritized remediation roadmap suitable for board presentations.

Process

How the FACHT Works

From initial contact to final deliverable in 5-10 business days, with no disruption to your operations.

01

30-Minute Intake: We gather basic info about your organization and tailor the assessment

02

Technical Assessment: 5-7 days of external analysis across all six domains

03

Expert Analysis: Senior analysts correlate findings and prepare your report

04

One-on-One Consultation: Walk through every finding and its business impact

05

Prioritized Roadmap: Quick wins, 30-day critical items, and quarterly strategic improvements

Why It Matters

The Threats Are Real and Active

Hidden Exposure

  • Employee credentials may already be circulating on dark web marketplaces from third-party breaches
  • Average dwell time exceeds 200 days -- attackers operate inside networks for months undetected
  • Basic antivirus and firewalls address only a fraction of the modern threat landscape

Compliance and Financial Risk

  • Non-compliance with HIPAA, CMMC, PCI DSS, or SOC 2 can result in fines, lost contracts, and litigation
  • A single breach can cost SMBs hundreds of thousands in response, fines, and lost revenue
  • The FACHT identifies your most critical vulnerabilities before they become incidents
Who This Is For

Tailored to Your Industry

Healthcare / HIPAA Defense Contractors / CMMC Financial Services / PCI DSS Legal Firms Technology Companies Small and Mid-Sized Businesses
FAQ

FACHT Assessment Questions

Is the FACHT assessment really free with no hidden costs?

Yes. No fees, no credit card, no subscription commitments, and no obligation to purchase services. If you choose to work with PTG for remediation after reviewing your results, that is a separate conversation on your terms.

Do I need to give PTG access to my internal systems?

No. The FACHT is conducted using external analysis techniques. You do not need to provide network credentials, install software, or make infrastructure changes. Having your IT administrator available for a brief conversation can improve accuracy but is not required.

How long does the FACHT process take?

5-10 business days from intake to report delivery. The intake meeting takes about 30 minutes. Technical assessment runs 5-7 days externally with no disruption. Analysis and report preparation takes 1-2 additional days.

How is the FACHT different from an automated vulnerability scan?

Automated scanners produce raw output with false positives and no business context. The FACHT is analyst-driven -- certified security professionals review, correlate, and interpret data across six domains. Your report is written in business language with severity ratings based on actual exploitability.

Is my data kept confidential?

All FACHT data is encrypted in transit and at rest, stored in SOC 2 compliant infrastructure, and accessible only to assigned PTG analysts. We will execute an NDA before beginning if requested.

Can PTG help with remediation after the FACHT?

Yes. PTG offers security risk assessments, managed cybersecurity, CMMC compliance, and IT security assessments for organizations that want professional remediation support.

Get Started

Discover What Hackers Already Know About Your Organization

The FACHT gives your business complete visibility into the threats, vulnerabilities, and compliance gaps targeting your organization. No cost, no obligation.