Book a meeting
I will be in touch to find the best time to meet you.
An audit conducted through survey, direct questions and observation.
Crunch the data
Produce your cyber security gap analysis and implementation action list
Help you understand the report and what is required.
Prioritize the implementation with you to be cyber protected as fast as possible while considering your resources.
Continued engagement to help your business be cyber safe
Hardware all electronic devices. Networking, servers, cloud, desktop, and mobile. Owned and BYOD
Physical security. Desktop, premises, cabinets
Access. Authentication, passwords, accounts
People, awareness, training, culture, contractors,
Network. Fixed and WIFI, video, communication, gateways
Software. Known, unknown, cloud, browser extensions
Social, websites, marketing, CRM
Backup and disaster recovery
Logging and Monitoring
Policies and procedures
Legislation. Industry specific, National and global requirements
Environment. Supply chain, customer