Our IT & Cyber Security Audit provides you with a robust overview of your current IT environment from a practical and security perspective.
Take the first steps to improve business efficiency & securing your network. Complete the form below and one of our Team will be in touch.
A general overview of the entire network is gathered by
investigating how devices are connected physically or wirelessly, and how geographical locations communicate (e.g. MPLS, VPN).
Application whitelisting for endpoints and mobiles (where applicable) are checked. COPE (company-owned personally enabled) and COBO (company-owned business only) devices are tested for restrictions. Anti-virus solutions are investigated for updates, scan schedules, and effectiveness.
The engineer will use different methods to determine operating system and firmware versions of network connected devices, internal device update schedules, and update management including mobile devices.
Email protection is checked for availability and effectiveness by sending test files. Rules are inspected.
Internal password policies will be inspected and compared to actual users to identify user compliance. Systems for the management of passwords are checked.
Web content filtering is checked for availability and effective by visiting test websites.
Active Directory users and groups are checked for anomalies and security best practices. Group Policies relating to password policy and workstation security are tested.
The distribution and contents of policies are inspected for GDPR compliance as recommended by the ICO.
File storage processes and solutions are checked for
efficiency and security. Backup and redundancy processes are investigated.
Doors, windows, CCTV, access control, etc are checked for obvious weaknesses and best practises.