A Cybersecurity Assessment is conducted to provide an informative state in time review of an organisation's Cybersecurity environment. We use analysis tools, policy and compliance review and staff interviews to build out a structured report. This is a highly specialised Cybersecurity consulting piece and provides an organisation with the information to make an informed assessment of the potential risks and recommendations to mitigate those risks. Our Cybersecurity team are experienced not only in the technical aspects, but also the management, governance and compliance aspects of IT.
The Mercury IT Cybersecurity assessment reviews the current cybersecurity posture by looking at:
- Systems configuration
Mercury IT will assess your policies specifically with a focus on the cybersecurity threat landscape to ensure your policies are meeting baseline requirements as set by your business requirements or by Mercury IT.
Mercury IT will assess your network systems for baseline security against well-known industry best practises such as ISO27001, NIST and ASD Strategies to Mitigate Cybersecurity Incidents.
Mercury IT will interview the business policy owners about what policies are in place, what requirements exist and if any planned future projects exist. Existing policies will be assessed with a focus on cyber risk and if these policies meet the baseline requirements for the business. Mercury IT will recommend any policy changes and if any new policies need to be introduced to mitigate cybersecurity risks.
Systems Configuration Review
Mercury IT will review existing systems configuration against best practice as defined by the scope agreed between the business and Mercury IT. The scope is often Microsoft servers such as AD, File and Print and mail. Network equipment such as firewalls, routers and switches.