page contents

IT Security Assessments

A secure digital tomorrow, today

Your network is always at risk. Whenever you’re connected, you are exposed to hackers, viruses, and threats to your information. For decades, the business world has fought against these threats with some success, but the threats get more complex every day. The people behind these attacks aren’t stopping, so why should you?

A strong firewall and a secure network are vital components in your security arsenal, but these protections don’t go far enough. As your network becomes more complex, you need to take bolder steps to protect yourself.

Eliminate Security Gaps

Our information security assessments will help you discover holes in your network that increase your exposure to information security risks. These issues can then be securely resolved before they can affect you.

We provide IT security assessments individually or as part of an overall information security improvement plan. Our team can advise you on what is most suitable for your organisation. We provide a range of security services to close gaps in your network and reduce the risks identified during an information security assessment. Speak to our team today to discuss your requirements.

Advanced Intelligence

Our IT security assessments are designed to pinpoint and analyse issues in your network. Our assessments provide comprehensive insights in your systems, giving you the ability to rapidly improve your infrastructure. Our assessments can help you:

  • Prevent viruses, malware, phishing and ransomware
  • Secure your network from external attack
  • Prevent unauthorised network access
  • Identify gaps in your infrastructure
  • Prevent insecure browsing and restrict access to unwanted online content
  • Discover the sensitive data your computers contain and protect it from compromise
  • Protect your assets against cybersecurity threats
  • Establish a more secure digital future

Contact us

01442 251 514

Free IT Assessment

Testimonials

Assessments We Offer

We offer a range of IT security assessments, available on their own or as part of an overall IT review.

Security Risk Assessment

An executive-level analysis of your infrastructure along with full reports, a summary, charts and, risk assessment. This report highlights and explains the security risks your organisation faces. Our team will identify appropriate solutions to help fill-in the gaps in your infrastructure and improve your security practices.

Highlights:

• System protocol leakage (insecure outbound protocols)
• Unrestricted protocols
• Web browsing user controls
• Wireless access (network availability & security)
• External security vulnerabilities
• External security threats
• Network share permissions & access to file system shares
• Domain security policies
• Local security policies (presence & consistency)
• Risk score rating (1-100)

This Assessment Will Identify:

• High, medium and low-level security risks
• Improvement recommendations
• Internal security vulnerabilities (webmail, pornography, shareware, social media etc)
• Local security policy consistency

A security management plan is included with this assessment. The management plan ranks issues by their potential risk and provides guidance to address the issue. We recommend that all high and medium issues are addressed as a priority, either by iQuda or by your internal team.

Security Policy Assessment

A comprehensive review of your local and domain level security policies.

Highlights:
  • Sampled system IP address, name & operating system
  • Password policy enforcement
  • Security option enforcement
  • Account lock policy implementation
  • Audit policy implementation
  • User rights assignment
This Assessment Will Identify:
  • Saved passwords in use
  • Age of passwords in use (oldest, youngest)
  • Password rules in place
  • Password encryption policies on your network
  • Account lockout threshold & duration
  • Audit logon events, directory service access, account management & policy change
  • Audit privilege use, process tracking, audit system events
  • Account administrator status by PC
  • Guest account status by PC
  • Settings & installations account privileges
  • Digital signing privileges
  • Shutdown, cryptography and account control privileges

This security assessment allows you to identify security policy enforcement across your network. The assessment is carried out at your site by a member of our Information Security team. We will consult with you after the assessment to develop a plan of action to bridge gaps in your policies. Available standalone or combined with other IT security assessments.

User Share Permissions Assessment

A comprehensive list of access permissions for each user in your organisation. This report details all access rights for shared computers, files and drives by user.

This Assessment Will Identify:
  • Share permissions by drive, computer and file
  • System permissions
  • User access per drive, computer and file

This report will help you identify and control user access rights on your network. Authorised user access is a key component of the ISO 27001 Information Security Standard and is an important consideration for companies of all sizes. Available standalone or combined with other IT security assessments.

User Behaviour Analysis Report

Provides a detailed overview of physical, remote and network system logins. Highlights all logins by system and user, with success and failure analysis at 24 hour, 7 day and 30 day intervals.

Useful for analysing user behaviour and user access to network systems. This is one of many IT security assessments that can be useful for understanding staff behaviour so security training can be given in response. Available standalone or combined with other IT security assessments.

Outbound Security Assessment

Identifies non-conformities in your network outbound ports and protocol accessibility compared to industry standards and best practice. Also provides a wireless security survey, highlights all wireless networks listed in your network and analyzes user access to restricted Internet content.

Assessment Highlights:
  • User internet controls (entertainment, pornography, shareware, social media, warez and webmail).
  • Wireless network security levels
  • Wireless network security risks
  • Outbound ports and protocol accessibility analysis compared to industry standards

This report identifies potential outbound security issues, allowing you to close network security gaps and protect your network from attacks. Available standalone or combined with other IT security assessments.

External Vulnerabilities & Threat Exposure Assessment

A comprehensive report covering security gaps, network warnings and informational items. Includes a full NMap Scan and checks on 65, 535 ports with open/close analysis.

Highlights:
  • Low, Medium & High-Risk item Summary
  • Host issue summary
  • Number and names of operating systems in use
  • Issue by severity report
  • False positive identification
  • Listening port analysis
  • Summary, vulnerability detection, impact, solution and insight report with testing methodology

This report provides a detailed overview of external network vulnerabilities. An essential for security compliance, the report provides thorough information for insightful security decision making. Available standalone or combined with other IT security assessments.

Computer Share Permission Assessment

A thorough list of all shared drives in place on each computer, along with details of access by level, file, user, group & device.

Highlights:
  • Permissions for share by computer
  • File system permissions for share
This Assessment Will Identify:
  • Share access by unauthorised users
  • Editing controls in place
  • Shares present on each computer
  • Non-compliant user access
  • Lack of access for authorised users

The share permissions report is particularly useful for organisations with compliance concerns, or those who are working towards compliance standards such as ISO 27001 or NHS Information Governance). The report is also useful for larger organisations where manually checking share permissions can be time-consuming and complex. Available standalone or combined with other IT security assessments.

Cyber Liability and Data Breach Report

Provides an extensive overview of cyber liability and potential data breaches across a network. Potential liability is monetized within the report to demonstrate potential exposure. All saved credit card and sensitive data details (e.g. security or National Insurance details) are identified and listed with the corresponding storage system name. Available standalone or combined with other IT security assessments.

Network Security Management Plan

Provides guidance to address all network security issues. Issues are ranked by priority, probability and threat exposure. The network security management plan provides a clear plan of action to close security gaps and decrease risk exposure. Available standalone or combined with other IT security assessments.

Why Work With Us?

We are professionally certified and our solutions are informed by global information security standards.

~

ISO 27001 CERTIFIED

This systematic management approach is a globally accepted standard of best practice. Informed by experts, the standard applies a risk management process to protecting and managing sensitive information. iQuda is externally audited to this standard, and we apply the principles to our IT security assessments.

NHS IGSoC Compliant

The Information Governance Statement of Compliance, or IGSoC, is an NHS Information Governance Standard. Due to the sensitivity of the data handled by the NHS and NHS affiliates, all organisations with the potential to access patient data are required to comply. iQuda is 100% compliant with this standard. We began the compliance process due to our support relationships with many prominent healthcare providers.

Industry-Leading Security Tools

Our expert security team is aided by an arsenal of industry-leading security tools. We use these tools to securely assess your network and provide you with a picture of the threats you face. When you work with us, all these tools are at your disposal and your network benefits from enterprise-grade tools at a fraction of the price. We guarantee that our IT security assessments will positively improve your understanding and application of information security practices.

Contact Info

01442 251 514

info@iquda.co.uk

Unit 3 Heron Business Park, Eastman Way, Hemel Hempstead, Hertfordshire, HP2 7FW

Share This