We’ll work with you to cover the basics of your network and security perimeter. Once we’ve done the check, you’ll get a baseline report of your cyber-security health. That enables us to have a chat about what the next steps look like, and where your biggest weaknesses and risks sit.
You’ve heard the saying a little bit of power can be dangerous? This also applies to your users (and administrators) permissions. We take a look at who’s got access to what across services such as: