Are your system administrators, network admin staff, engineers, and other trusted technical staff following best practice when it comes to configuring and maintaining the security of your systems? This informal, non-accusatory, friendly interview-based consultancy service is designed to find out.
It takes the form of one or more dialogue sessions between your staff and our consultant, resulting in the production of a technical report into the overall security health of your technical operations. Although this service works best when done face-to-face, it can be conducted over the telephone if required. The entire process, from initial interview(s) to the delivery of the report generally takes about 2 weeks and typically requires between 2 and 4 chargeable days.
The process aims to help discover whether any fundamental security weaknesses exist in the way that your systems are maintained and managed. For example, whether access control permissions on key systems are correct, whether your password policy for administrators is reliable, whether physical access to key locations is sufficiently controlled, and so on.