Cyber security review

Our cyber security review allow us to identify and recognise risk across your organisation’s people, processes and technology.

A comprehensive audit can help you to check that your information security controls are operational and effective, and build a roadmap for improvements to strengthen your security posture. Undertaking a review will provide your organisation with an independent third-party assessment of your current state and our experts are there to help you develop a strategy to increased maturity in the future.

Cyber security review overview

The following areas are included within the assessment:

  • Security controls
  • Key cyber assets
  • Business continuity
  • Responsibilities and roles
  • Incident management
  • Staff awareness and current training
  • Risk register
  • Policies
  • Cyber risk governance
  • Any contractual, legal or regulatory obligation

The technical areas

  • How you monitor security
  • Your access controls
  • Perimeter controls – firewalls, IDS, IPS Proxy
  • What anti-malware is in place
  • An overview of user privileges
  • We review IT core infrastructure devices and sample endpoints
  • Data classification
  • Mobile Device Management (MDM), Multi-Factor Authenticator (MFA), and mobile working

The physical areas

  • How safe your perimeter is


  • Designated secure areas
  • The physical security of your IT systems
  • Any third party access or policies

Reporting on the cyber security review

Cognisys presents its findings in a comprehensive yet simple report format.

This typically comprises of:

  • An executive summary
  • Methodology
  • Technical findings
  • Prioritised recommendations for remediation

Discover how we’ve helped leading organisations

RECENT UPDATES

Understanding internal vs. external penetration testing: which is best for your business?

TIPS

Understanding internal vs. external penetration testing: which is best for your business?

In this blog, we will help you understand the differences between internal and external penetration testing and how to choose the best approach for your industry.

Key features your vulnerability management platform must have

BLOG

Key features your vulnerability management platform must have

In this blog, we delve into the core concepts of vulnerabilities and the significance of a robust vulnerability management platform.

The biggest cyber attacks and vulnerabilities from June 2024

BLOG

The biggest cyber attacks and vulnerabilities from June

Insights and trends from recent cyber threats and vulnerabilities from June.

Let’s make things happen

Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.

info@cognisys.co.uk
Leeds office

5 Park Place
Leeds
LS1 2RU

info@cognisys.co.uk
Manchester office

The Sharp Project
Thorpe Road
Manchester
M40 5BJ

LET’S TALK