Information Security Assessments


Information Security Assessments

Do you know where your organization's confidential, sensitive, and most valuable information is stored?
Is it properly safeguarded? 

 

Get In Touch 

How secure is your organization? 

Are your staff members unintentionally putting your organizational research, data, and information at risk by using unauthorized "shadow IT" systems? Do your staff members follow best practices for safe computing? Are your policies, procedures, and technical controls strong enough to keep your organization safe?

Do you worry that your organization's approach to information security isn't as strong as it should be, but you don't know where to start? 

For many organizations, the research, data, knowledge, and intellectual property they produce is at the heart of the organization, so it is imperative that these materials are properly protected. Doing so requires a holistic, organization-specific approach to information security, including clearly-articulated information governance and policies, a strong technical foundation, the adoption of good practices by all staff, and the day-to-day care and feeding of information security operations.  

If you're worried about your organization's approach to information security, we can help.

Our advice is:

  fa-check  

Practical

We'll recommend realistic, practical action items that you can put into practice immediately. 

  fa-bullseye  

Actionable

Strengthen your organization by following a clear path forward. 

  fa-dollar  

Valuable

We'll help you maximize existing investments in the people and technology you already have in place.  


How we work

We'll take an in-depth look at all aspects of your organization's current approach to information security -- everything from policies, procedures, and staff training to plans for how you'd handle a data breach. We'll also look at the systems and technical controls in place to safeguard your organization's most-important information, data, and knowledge. We'll talk to staff to solicit their input, understand their concerns, and build buy-in. 

  fa-television  

Technical Assessment

Direct review of systems, configurations, logging features, and more


  fa-file-text-o  

Document Review

Review architectural, operational, and governance documents -- policies, procedures, disaster plans, training materials, and more

  fa-comments-o  

Conversations

Conversations with staff and other key stakeholders such as board members, partners, or collaborators to hear concerns and pinpoint issues

By the time we're finished, you'll know what steps you need to take to strengthen your organization's security. You'll know what to do to keep your organization's digital assets protected, backed up, and always available. 

Find out more about our approach >>

Let us help you protect and secure your organization's most valuable materials -- 
your data, information, knowledge, research, and intellectual property.