Cyber Risk Assessment

Home / Cyber Risk Assessment

We offer a free cyber risk assessment

Understanding your risk exposure is vital to reducing the likelihood and impact of a damaging cyber attack.

We offer customers a FREE cyber risk assessment, one that is designed to cover all of the potential threat landscape and attack surface of their organisation. The starting point for effective cyber security is to review your risk profile and current security posture. Then and only then can you devise a suitable plan for improvements.

The FREE cyber security risk assessment is undertaken during a Microsoft Teams call and normally takes approximately 30 minutes to complete.

Scope of the risk assessment

Security Governance

Is there a strong level of security governance established within the organisation?

Are senior leaders supportive of security objectives?

Is there a strategy, budget and delivery plan in place for security improvements?

Security Standards and Legislative Compliance

Does the organisation possess security accreditations?

If not, why not?

What certifications exist?  E.g. cyber Essentials, ISO 27001?

How has the organisation aligned compliance with GDPR and other legislations?

Human Resources and Security Processes

Is there a specific policy on HR security?

Is there a Starters, Movers and Leavers procedure?

Are referencing and criminal records checks undertaken?

Do HR set roles with IT for least privileged access?

Training and Awareness

Is there Cyber and Information Security Awareness Training in place for all staff?

Is there Data Protection Awareness Training in place for all staff?

Is this training available to new starters on induction?

Do staff have to complete annual refresher training?

Risk Management

Is there a formal risk management process in place?

Is this aligned to information assets?

Is there evidence of active risk management?

How are risks identified and evaluated?

Are senior leaders supporting risk management activities?

Threat Detection and Response

Are threats monitored?

If so, how are they monitored?

Is there perimeter threat monitoring?

Are threats monitored on the endpoints?

Is there a centralised approach to threat monitoring?

Are response plans in place?

Are there skilled and experienced resources available to evaluate threats and respond accordingly?

Incident Management

Is there a documented Incident Response Plan?

Is the Incident Manager identified and appropriately trained?

Are there supporting services in place to support incidents?

Are incidents being reported and logged appropriately?

Access Controls

Is there a documented Access Control Policy?

How is access controlled?

What secure methods are adopted?

How is least privilege applied?

Is access based upon an RBAC model?

Cloud v On-Premise Infrastructure

What is the level of adoption of enterprise cloud infrastructure?

How is this applied to core business systems?

Is there an internal network?

How is security managed in the cloud?

Who supports internal infrastructure?

Vulnerability Management

How does the organisation assess where it may be vulnerable?

Are regular pen tests undertaken?

Are there automated tests being done on a regular basis?

What is the approach to patching?

SOC / SIEM

Is there a SIEM in place?

Are all critical systems connected?

Is there a Security Operations Centre (SOC)?

If not, why not?

Policies and Procedures

Is there a full set of policies and procedures that relate to security management and other regulatory compliance?

Whats missing and why?

Personal Data Protection

Is the organisation GDPR compliant?

Is there a ROPA in place?

Has the organisation undertaken ISO 27701 certification?

How does the organisation align to the core data protection principles?

Email Security and Management

What is the use of email?

Which email provider is used?

Are inboxes managed, e.g. data retention?

What security is applied to email access e.g. MFA?

Is there Phishing Training in place?

Is there access to email encryption technology?

Is Data Loss Prevention applied to emails?

Device Protection and Management

Are devices centrally managed e.g. via InTune?

Are devices encrypted?

Are devices configured with 2FA for access?

Is there a BYOD policy?

Back-up and Restoration

Are back-ups centrally managed?

How often is critical data and system configurations backed up?

Is the Recovery Point Objective (RPO) for critical data known?

Is the Recovery Time Objective (RTO) for critical systems known?

Has there been recent tests of restoration from back-ups?

Are back-ups in the cloud?

Are back-ups encrypted?

Supplier Security Management

Are there any security due-diligence checks on third-party suppliers?

Is there a supplier security policy?

What is the approach to supplier security in procurement scenarios?

Containment and Recovery Capabilities

How is the organisation prepared for containing incidents e.g. a data breach?

Are there forensic tools available to assess an incident and establish a root cause?

How is the organisation prepared for recovery?  Are there the right level of plans in place (e.g. Business Continuity and Disaster Recovery)?

DPO Training

Recommendations

We base our recommendations on your current risk status.

We will provide you with a detailed overview of what you need and also provide you with some recommendations for services and solutions.

Note – Our service is provided on a no obligation basis, so feel free to obtain alternative proposals.

THE THREAT LEVEL IS ON THE INCREASE

Over 50% of UK businesses were victim of a recent cyber attack

CERTIFICATIONS

Certifications include:

ARRANGE A CALL

Schedule a free Cyber Risk Assessment

Contact us

Cyber Risk Assessment
First
Last
Data Protection - Please give your explicit consent for the processing of your personal data.