Business cyber security assessment

Our 5D Security Strategy – 02 – The Deep Dive!

We will perform a Cyber Security Assessment using our Cyber Security Assessment Tool (CSAT).

The assessment aims to bring you a better understanding of your company’s current cybersecurity posture, and actionable items to mitigate the discovered risks.

The CSAT consists of a technical scan of your environment and an interview based on renowned CIS – Centre for Internet Security controls.

The report that will receive at the end of this process is packed with recommendations to enhance your IT environment, based on industry recommended practices.

To give you a better understanding of our approach, first a short introduction of CIS and Human-operated ransomware.

To give you a better understanding of our approach, first a short introduction of CIS and Human-operated ransomware.

Center for Internet Security (CIS)

The Center for Internet Security® (CIS) is a community-driven non-profit, responsible for the CIS Controls® and CIS Benchmarks™.

The organisation provides globally recognized best practices for securing IT systems and data. The CIS global community of IT professionals continuously evolves these standards to proactively safeguard against emerging threats.

The CSAT QuickScan questionnaire is based on the CIS Controls Implementation Group (IG) 1. CIS describes IG1 as “basic cyber hygiene”, which is the foundational set of cyber defence safeguards for all Organisations. Therefore, the IG1 is a subset of the CIS Controls. For more information on the Center for Internet Security visit https://cisecurity.org.

Human-Operated Ransomware

Human-operated ransomware is a significant and growing attack trend that represents a threat to Organisations in every industry. Human-operated ransomware attacks are targeted at the entire organisation.

Attackers adapt their methods based on their findings while carrying out the attack: from commonly known system and security misconfigurations via phishing attacks, up until sophisticated customized malware to gain access to your organisation’s network/assets. The more profit attackers assume to make from your organisation, the more they are willing to invest getting there.

 

What to expect

CSAT helps to quickly assess the current status of your organization’s security and provides recommendations based on facts retrieved from your IT environment.

The tool collects relevant security data from a selection of your endpoints, local Active Directory, email DNS, and the Microsoft Cloud.

Additionally, CSAT uses a questionnaire to collect data about policies, procedures and other key indicators.

Based on the information retrieved from your IT environment and the answers to the questionnaire, CSAT provides you with a fact- and risk-based action plan to improve your Cyber Security immediately.

Dont become a statistic - get your business cyber secure today!

Get in touch