Cyber security review

Identify and recognise risk across your organisation’s people, processes and technology

A comprehensive audit can help you to check that your information security controls are operational and effective, and build a roadmap for improvements to strengthen your security posture. Undertaking a review will provide your organisation with an independent third-party assessment of your current state and our experts are there to help you develop a strategy to increased maturity in the future.

The following areas are included within the assessment:

  • Security controls
  • Key cyber assets
  • Business continuity
  • Responsibilities and roles
  • Incident management
  • Staff awareness and current training
  • Risk register
  • Policies
  • Cyber risk governance
  • Any contractual, legal or regulatory obligation
Senior Cyber Security Consultant reviewing code for a comprehensive cyber security review

The technical areas

  • How you monitor security
  • Your access controls
  • Perimeter controls – firewalls, IDS, IPS Proxy
  • What anti-malware is in place
  • An overview of user privileges
  • We review IT core infrastructure devices and sample endpoints
  • Data classification
  • Mobile Device Management (MDM), Multi-Factor Authenticator (MFA), and mobile working

The physical areas

  • How safe your perimeter is

  • Designated secure areas

  • The physical security of your IT systems
  • Any third party access or policies

Reporting on your cyber security review

Cognisys presents its findings in a comprehensive yet simple report format.

This typically comprises of:

  • An executive summary
  • Methodology
  • Technical findings
  • Prioritised recommendations for remediation

Discover how we’ve helped leading organisations

Sekura.id achieved ISO 27001 certification in just 6 weeks through our Digital Trust Accelerator.

Sekura ID

Discover how Tenyks achieved SOC 2 Type 1 compliance in just one week.

Tenyks

Liaison Group tamed an extensive vulnerability list with our vulnerability management solution.

Liaison Group Logo

Let’s make things happen

Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.

info@cognisys.co.uk
Leeds office

5 Park Place
Leeds
LS1 2RU

info@cognisys.co.uk
London office

131 Finsbury Pavement
London
EC2A 1NT

CONTACT OUR TEAM

RECENT UPDATES

Deltia.ai shows commitment to security with ISO 27001

CASE STUDY

Deltia.ai shows commitment to security with ISO 27001

Learn how Deltia.ai, an AI-driven manufacturing solutions provider, protected their data and customers with ISO 27001.

The biggest cyber attacks and vulnerabilities from October 2024

NEWS

The biggest cyber attacks and vulnerabilities from October 2024

Insights and trends from recent cyber threats and vulnerabilities from October.

Top 10 best practices for API security

BLOG

Top 10 best practices for API security

Learn why API security is more important than ever and how strategies like encryption, input validation, and Zero Trust can help protect your data.