Cyber Health Check

Mitigating cyber risks comprehensively

A truly robust cyber security regime is founded on a comprehensive cyber risk assessment programme to identify the gaps in an organisation’s critical risk areas and to determine the right actions to close those gaps. If you are embarking on a cyber security improvement programme, a cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks.

Why do you need a cyber health check?

A cyber health check is essential in establishing a solid foundation on which to build your security infrastructure. A cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks. It includes vulnerability scans of critical external infrastructure IPs and websites/URLs.

A cyber health check helps establish a secure infrastructure, which is a requirement of regulatory initiatives and compliance standards such as ISO 27001, the General Data Protection Regulation (GDPR), Cyber Essentials and others.

Find out how our cyber health check service can help your organisation today

Our cyber health check is an independent, high-level, four-phase analysis of your cyber security posture that combines on-site consultancy and audit, technical cyber security control assessments, remote vulnerability assessments and an online staff survey. We will identify your actual cyber risks, assess the effectiveness of your responses to those risks and then create a prioritised action plan for managing those risks in line with your business objectives.

Find out more

What a cyber health check does

A cyber health check will provide you with an incisive and detailed report describing your current cyber risk status and critical exposures, and will draw on best practice – such as ISO 27001, and Cyber Essentials – to provide recommendations for reducing your cyber and compliance risk.

The report provides feedback in the following areas:

  • Cyber risk governance
  • Cyber asset management
  • Cyber risk management
  • Legal, regulatory and contractual obligations
  • Policies, procedures and information security management
  • Roles and responsibilities
  • Business continuity and incident management
  • Training and awareness
  • Cyber security controls
  • Vulnerability assessment
  • Staff awareness assessment

The difference between a cyber health check and a cyber security audit

A cyber security audit is a one-day consultancy service offering a high-level cyber review of the organisation and its IT estate. It identifies key areas of cyber risk.

A cyber health check, however, is more exhaustive in scope. Aside from the audit and the technical cyber security controls included in the cyber security audit service, a cyber health check also conducts vulnerability scans of critical external infrastructure IP and website addresses, and an online staff questionnaire that determines employees’ actual cyber security practices.

A cyber security audit provides a snapshot, or an overview, of an organisation's IT security posture at a particular moment. A cyber health check, however, delves deeper and looks at the policies and procedures that have contributed to that IT security posture. In that sense, a cyber health check is more concerned with the security processes that describe how people and technology interact to determine whether it is contributing to or hampering overall cyber security.

Receive a prioritised action plan

In each of these areas, the health check identifies cyber risks and assesses your current response to those risks. This service includes:

  • On-site interviews with key managers;
  • An on-site physical security assessment;
  • External vulnerability scans;
  • Online staff awareness questionnaires; and
  • High-level analysis and expert recommendations for next steps.

The result is a  prioritised action plan to mitigate those risks effectively and in line with your business objectives.

Ask yourself these questions:

  • Does your board receive regular reports on the status of your company’s cyber security governance? If so, how often are the reports received?
  • Have you identified your key information assets and thoroughly assessed their vulnerability to attack?
  • Has responsibility for cyber risk been allocated appropriately? Is it on the risk register?
  • Do you have an effective risk governance structure that your risk tolerance and controls are aligned with?
  • Do you have appropriate information risk policies and adequate cyber insurance?

If you answered ‘no’ to any of the questions, you could suffer considerably from an attack, especially if you are a public sector organisation or handle large volumes of personal data.

The NIS Directive

The EU Directive on security of network and information systems (NIS Directive) requires operators of essential services (OES) and digital service providers (DSPs) to implement appropriate security measures to protect services that are essential to the national infrastructure, with the view to ensure continuity of those services.

The NIS Directive is aimed at bolstering cyber security across sectors that rely heavily on information and communications technology. Certain businesses operating in critical sectors are known as OES. The sectors affected by the NIS Directive are: Energy; Transport; Health; Water; and Digital infrastructure.

Due to the sensitive nature of these sectors, you will often find that the first requirement towards compliance with the NIS Directive is a Cyber Health Check.

Why choose IT Governance?

IT Governance has more than 15 years’ experience helping organisations get their cyber security right, working with boards and senior managers to identify and manage cyber risks in line with the organisation’s risk appetite and commercial business drivers.

  • Our specialist team has extensive data protection and information security management project expertise, both in the UK and overseas.
  • Our transparent proposals are fixed price, so you won’t get any unexpected surprises.
  • You will have access to a dedicated relationship manager throughout the project.

IT Governance is also recognised under the following frameworks:

  • CREST certified as ethical security testers.
  • Certified under Cyber Essentials Plus, the UK government-backed cyber security certification scheme.
  • Certified to ISO 27001:2013, the world’s most recognised cyber security standard.
top
Protect your
business
this winter