Is Information Risk Management currently on your Board’s agenda? *
Do you know what information you depend on and where it is? *
Do you have a company wide Information Security Policy? *
Do you carry out regular risk assessments? *
Do you apply appropriate controls to protect personal information in accordance with current legislation? *
Do you provide guidance to employees on information security? *
Have you implemented detection and prevention controls to protect against malicious software? *
Are all of your system changes managed within a formal change control process? *
Do you keep audit logs for all security-relevant events? *
Does your network team carry out regular vulnerability testing? *
Is redundant media and equipment with storage capability securely disposed of when no longer required *
Does your business have a Contingency Planning process? *
You must select an answer before continuing.
Your cyber security challenges and our pragmatic approach - we could be the perfect fit. Contact Dave James, MD at Ascentor for an informal chat.