Book a meeting
I will be in touch to find the best time to meet you.
Gather data
An audit conducted through survey, direct questions and observation.
Understand
Crunch the data
Report
Report
Produce your cyber security gap analysis and implementation action list
Knowledge
Help you understand the report and what is required.
Prioritize Effort
Prioritize the implementation with you to be cyber protected as fast as possible while considering your resources.
Action
Continued engagement to help your business be cyber safe
for Audit
Hardware all electronic devices. Networking, servers, cloud, desktop, and mobile. Owned and BYOD
Physical security. Desktop, premises, cabinets
Access. Authentication, passwords, accounts
People, awareness, training, culture, contractors,
Network. Fixed and WIFI, video, communication, gateways
Software. Known, unknown, cloud, browser extensions
Social, websites, marketing, CRM
Backup and disaster recovery
Risk analysis
Logging and Monitoring
Policies and procedures
Legislation. Industry specific, National and global requirements
Environment. Supply chain, customer
© 2020 All Rights Reserved.