Cyber security review

Our cyber security review allow us to identify and recognise risk across your organisation’s people, processes and technology.

A comprehensive audit can help you to check that your information security controls are operational and effective, and build a roadmap for improvements to strengthen your security posture. Undertaking a review will provide your organisation with an independent third-party assessment of your current state and our experts are there to help you develop a strategy to increased maturity in the future.

Cyber security review overview

The following areas are included within the assessment:

  • Security controls
  • Key cyber assets
  • Business continuity
  • Responsibilities and roles
  • Incident management
  • Staff awareness and current training
  • Risk register
  • Policies
  • Cyber risk governance
  • Any contractual, legal or regulatory obligation

The technical areas

  • How you monitor security
  • Your access controls
  • Perimeter controls – firewalls, IDS, IPS Proxy
  • What anti-malware is in place
  • An overview of user privileges
  • We review IT core infrastructure devices and sample endpoints
  • Data classification
  • Mobile Device Management (MDM), Multi-Factor Authenticator (MFA), and mobile working

The physical areas

  • How safe your perimeter is

  • Designated secure areas
  • The physical security of your IT systems
  • Any thrid party access or policies

Reporting on the cyber security review

Cognisys presents its findings in a comprehensive yet simple report format.

This typically comprises of:

  • An executive summary
  • Methodology
  • Technical findings
  • Prioritised recommendations for remediation

Discover how we’ve helped leading organisations

RECENT UPDATES

TIPS

Is bringing your own device to work a bad idea?

As ‘Bring Your Own Device’ or BYOD rises in popularity, with more than two-thirds of us using a personal device at work, it’s important for businesses to understand the security risk that this can pose.

TIPS

What is attack path management?

In a world where identities are the new security perimeter, compromising identity platforms like AD and AAD provides the greatest payoff for attackers, ultimately giving them control of all users, systems and data within the organisation.

TIPS

.ZIP domain registration: A risky gateway to nefarious outcomes

In the ever-evolving world of cybersecurity, understanding emerging threats is critical to maintaining a robust defence. One trend currently attracting attention is the registration of .ZIP domains.

Let’s make things happen

Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.

info@cognisys.co.uk
Leeds office

5 Park Place
Leeds
LS1 2RU

info@cognisys.co.uk
Manchester office

The Sharp Project
Thorpe Road
Manchester
M40 5BJ

LET’S TALK