Cyber Security Health Checks
Businesses are heavily reliant on technology to manage critical information and effectively run their business operations to deliver better service, experience and productivity. However, businesses that embrace technology have increasingly become targets of hackers and organised crime. Cyber-attacks are increasing, especially those that involve data leakage or the compromise of sensitive business or customer information. Reputational damage, legal action and fines or compensation are among the many consequences victimised companies face. More so with the regulated population.
Check your cyber immunity
Have you ever considered what would happen if your sensitive business or customer information was compromised or your computer systems, technology dependent enterprises or networks were exploited? Building cyber resilience capabilities have become a high priority for many companies operating in critical sectors. Privasec can help identify your cyber threats and risks and assess the existence, effectiveness and efficiency of a range of industry better practice security controls across a complete range of domains.
How this services help
As reliance on technology increases, the risk from cyber-attacks also increases. Privasec can assist to determine, evaluate and manage the cyber risks your business face, and take actions to improve your cyber resilience. Our Cyber Security Health Checks helps you identify current security strengths and weaknesses and ensure that you are protecting your most important business assets. Privasec’ experienced consultants will help you design a strategic security roadmap or identify specific solutions to resolve your business’ security weaknesses.
How this service works
- A dedicated senior consultant coordinates workshops with your key SMEs to review your critical business processes and functions, technologies used and networks to identify and qualify cyber threats and risks.
- Based on the information obtained, the senior consultant will assess the existence of a range of industry better practice security controls for their effectiveness and efficiency.
- You will be given a Health Check report that identifies and explains all the areas where adequate controls are either missing or deficient and will prioritise the risks to your business operations.
- A report with practical recommendations will be proposed and prioritised to create a high-level security roadmap.
The onsite component of this service can be delivered in person at your offices or over the phone (video conference) over one to two days.
What you get
We will provide you with a concise report that:
- Describes your current cyber threats and risks.
- Identifies and prioritises the key findings.
- Includes a strategy and a roadmap to reduce your cyber risks and help build cyber resilience capabilities.
Health check preparation
The following people may be asked to provide information during the workshops:
- Key business stakeholders involved in managing and operating your IT operations.
- Information security manager or staff responsible for Information/IT Security.
- Administrators of the systems and network(s) processing, containing and/or supporting your business operations.
- Third party SMEs who may be involved in your IT operations and ongoing management. We will need to review your existing documentation to assess your current risks. We recommend you gather the following documentation (if it exists) for the initial workshop:
- Network diagram showing the systems and networks supporting your business operations
- Configuration standards of the servers and network devices in scope (if existing)
- Information Security Policy
- Acceptable Use Policy
- Information Classification Policy
- User Provisioning Processes
- Hiring, Induction and Termination Processes
- Vulnerability Management (Patching) Policy
- Security Incident Management Standard
We Provide The Best Service In Industry
Our team of experienced Governance, Risk and Compliance (GRC) consultants can help assess and support your organisation’s cyber security strategy.