With the increased amount of people that work from home and speed of digital adoption, comes also an increased risk in IT security leaks.
As you are probably aware, IT security is a broad subject and covers many topics. From security awareness training for your employees, password policies to even the physical entries of your IT rooms, etc.
Companies not only want insights in their vulnerabilities BUT also a clear action plan on how to tackle them.
A plan without execution is just an idea, right?
The issue? Most of the cybersecurity assessments/audits only focus on a certain topic and don't paint the whole picture.
Securing and locking down the front door while the back entrance is wide open, doesn't help at all.
Our CSAT security audit exists of two parts:
Cyber security We use part automated scans, analyses and part investigation from our experts to cover all angles. Our assessment is based on the CIS 20 framework focussing on 20 key actions that organisations should implement to block or mitigate known cyberattacks. In addition, we don't deliver you just a report, recommendations and move on but we can also assist you in taking the necessary actions to fix them. |
Cyber resilience Let's be realistic here. No-one is 100% protected against cyberattacks. It’s not a question “if”, but rather “when”. Not only does the amount of attacks increase at an impressive speed. They also get more and more complex every time. According to Gartner 75% of companies will have dealt with 1 more cyberattacks from now until 2025. If you’re hit, a fast recovery with a minimum of dataloss is key !
That's why we include the cyber resilience part in our audit to measure in what degree, you are prepared to recover from a cyber/ransomware attack and provide recommendations. |
Read our blog on how to protect your back-up data from cyber/ransomware attacks >>
❝ Security is a mindset ❞
Intake and installation
In this first step we start with a kick-off to determine the scope with you. We then install the CSAT scanning tool on a device to your liking (virtual or physical server/workstation), local or in the Azure cloud. We also check the endpoints for proper network connectivity.
Collecting data (2 weeks)
Once the CSAT tool is installed we run the scan and collect all the information. We scan the endpoints, Active directory, Office 365 environment, Azure, Microsoft intone, etc. In addition to that we also conduct a questionnaire with the CIO or IT-manager
Presentation of the end results
We analyse the result and write them down in a final report
Reporting and adviseWe present our recommendations + the action plan we developed for you.
In this report we cover many topics:
Leuvensesteenweg 510, 1930 Zaventem
+32 2 790 81 11