Do you want to check your security status quickly and simply? This Cybersecurity assessment quickly provides insight in your current cyber security status and potential vulnerabilities through automated scans and analyses of your IT environment. The assessment provides fact-based recommendations and an action plan to improve your security. It’s the perfect way to maximize security and demonstrate that your organisation takes security seriously. This is also important given the GDPR and local Data Protection regulations.

To help check the security status of your organization, QS solutions – in partnership with Microsoft – developed the Cyber Security Assessment Tool (CSAT), which organizations can use to gain insights on hidden risks and threats to their network and infrastructure.

During this assessment, QS solutions will draw up an easy to understand final report with advises and recommendations to develop a roadmap for implementation of organizational processes and software tools to maximize infrastructure and information security.

Add to cart

has been added to your cart!

have been added to your cart!

Description

The assessment timeline is around one week, divided in 4 separate contact moments.

Intake and preparation

In this step we will do a short kick-off call to discuss the next steps, the requirements and to discuss expectations.

Interview and installation

In this step we will share the online questionnaire and help you out if needed. Also, we will do the installation of the scanning software in your environment.

Run the scan

We will run the scan an pull all relevant security information form a sample of the endpoints and Active Directory. With the information form the questionnaire and the technical details we will draw up the fact-based action plan.

Presentation of the report

We will present the action plan to you and you colleagues, so you see where you currently stand, and how you can improve your cybersecurity. The report will outline ‘Quick wins’ and a list of recommendations for your cybersecurity roadmap.

The final deliverable is a factual finding report. The report will include a list of the identified vulnerabilities and practical recommendations, based on the in-scope IT infrastructure components. The report is easy to understand and holds advises and recommendations to develop your cybersecurity roadmap for implementation of both organizational processes and software tools to maximize infrastructure and information security.

Table of content

  1. Introduction
  2. Organization Information
  3. Organizational Security
  4. Essential Security
  5. Supplementary Security
  6. Microsoft Product Overview
  7. Urgent Action Items and Quick Wins