Do you want to check your security status quickly and simply? The Cyber Security QuickScan provides insight in your current cyber security status and potential vulnerabilities through automated scans and analyses of your infrastructure. The Cyber Security QuickScan quickly provides fact-based recommendations and an action plan to improve your security. It’s the perfect way to maximize security and demonstrate that your organisation takes security seriously. This is also important given the GDPR regulations.
The engagement timeline is one week, divided in 4 separate contact moments. We approximately need half a day of your time in total to do the Cyber Security Quick Scan.
Intake and preparation (15 min)
In this step we will do a short call to discuss the next steps, the requirements and to discuss expectations.
Interview and installation (2.5 hours)
In this step we will share the online questionnaire and help you out if needed. Also, we will do the installation of the scanning software in your environment.
Run the scan (30 min)
We will run the scan an pull all relevant security information form your endpoints and Active Directory. With the information form the questionnaire and the technical details we will draw up the fact-based action plan.
Presentation of the report (15 min)
We will present the action plan to you and you colleagues, so you see where you currently stand, and how you can improve your cybersecurity. The report will outline ‘Quick wins’ and a list of recommendations for your cybersecurity roadmap.
The final deliverable is a factual finding report. The report will include a list of the identified vulnerabilities and practical recommendations, limited to the in-scope IT infrastructure components considered for testing, at the specific time the review is conducted. Should client require an assurance report, specifically an opinion on the effectiveness of the security controls implemented in the IT environment for the related devices, you will need to ensure that the sample devices selected for testing is representative of the entire IT environment.
Table of content
2 Organization Information
3 Organizational Security
4 Essential Security
5 Supplementary Security
6 Microsoft Product Overview
7 Urgent Action Items and Quick Wins