Cyber Security Health Check
- Home
- Cyber Security Health Check
Get a Cyber Security Health Check
An expert assessment of your organisation's security posture
Our Cyber Security Specialists can provide a complete review of your organisation's cyber security. As well as pointing out gaps in your defence, we'll provide recommendations on actions to take to improve your cyber health.
Let our Cyber Security Specialists help
A Cyber Security Health Check is a great starting point if you’re looking for a general uplift to your cyber security.
Conducted online, it’s a fast and easy way to have one of our Cyber Security Specialists assess your organisation’s overall security posture and provide recommendations on ways to strengthen your cyber security.
After assessing your security risks, our experts will provide a Cyber Security Health Check Report outlining their findings. The report provides a high-level view of the key cyber risks to your business as well as recommendations on how to treat these weaknesses to improve your cyber defence. Consider it a map of the cyber-risk terrain—specific to your organisation—along with the blueprints to cyber security fortification.
How we perform a Cyber Security Health Check
1. Online questionnaire
The person in your organisation who knows the most about your technology and cyber security completes an online questionnaire provided by us.
2. Expert review
Our Cyber Security Specialists will review the responses of the questionnaire and identify key risk areas to your organisation’s security. They will also formulate recommendations to address and manage risk areas.
3. Report w/ recommendations
We’ll provide a summary report of our findings and recommendations. The Cyber Security Health Check Report will focus on weaknesses in your cyber security and ways to strengthen these areas.
What's covered in the Cyber Security Health Check
Our cyber security specialists assess and review a broad range of security topics, including:
- Data protection
- Perimeter defences
- Secure network and systems controls
- Identity and access controls
- Malware controls
- Vulnerability management and patching
- User awareness
- Compliance
- Incident readiness.