Our IT & Cyber Security Audit provides you with a robust overview of your current IT environment from a practical and security perspective.
The purpose of the IT & Cyber Security Audit is to identify and highlight key areas where changes are needed to improve business efficiency, the security posture of your IT network and protect sensitive data from an internal and external perspective. It gives you a strategic view of how to harness technology with a roadmap for the future
Below is an outline of all the areas our IT & Cyber Security experts will investigate as part of the checks of your IT infrastructure. After performing these investigations, a report of their findings will be created detailing issues found. The report will also offer remediation advice to be followed internally or outsourced.
Take the first steps to improve business efficiency & securing your network. Complete the form below and one of our Team will be in touch.
A general overview of the entire network is gathered by
investigating how devices are connected physically or wirelessly, and how geographical locations communicate (e.g. MPLS, VPN).
Application whitelisting for endpoints and mobiles (where applicable) are checked. COPE (company-owned personally enabled) and COBO (company-owned business only) devices are tested for restrictions. Anti-virus solutions are investigated for updates, scan schedules, and effectiveness.
The engineer will use different methods to determine operating system and firmware versions of network connected devices, internal device update schedules, and update management including mobile devices.
Email protection is checked for availability and effectiveness by sending test files. Rules are inspected.
Internal password policies will be inspected and compared to actual users to identify user compliance. Systems for the management of passwords are checked.
Web content filtering is checked for availability and effective by visiting test websites.
Active Directory users and groups are checked for anomalies and security best practices. Group Policies relating to password policy and workstation security are tested.
The distribution and contents of policies are inspected for GDPR compliance as recommended by the ICO.
File storage processes and solutions are checked for
efficiency and security. Backup and redundancy processes are investigated.
Doors, windows, CCTV, access control, etc are checked for obvious weaknesses and best practises.