Security
Assessment
A security assessment gives you a complete, honest picture of your current cybersecurity posture — what is exposed, what controls are missing, and what fixing them actually costs. No inflated findings designed to justify a large retainer. No jargon that obscures more than it reveals.
Book a free briefing →What we assess
Attack Surface
Every internet-facing asset, exposed service, and entry point into your environment — including ones you may not know about.
Identity & Access Controls
User provisioning, privileged access management, MFA coverage, and Active Directory configuration.
Endpoint Security
AV/EDR coverage, patching cadence, encryption status, and configuration hardening across workstations and servers.
Cloud Configuration
M365, Azure, AWS, and Google Workspace settings — storage permissions, admin access, conditional access policies, and logging.
Security Policies & Processes
Incident response plan, backup and recovery procedures, vendor risk management, and staff security awareness.
Compliance Posture
Gap analysis against Cyber Essentials, ISO 27001, NIST, or your specific regulatory requirements.
What you receive
Executive Summary
A one-page overview of your overall security posture, top risks, and recommended priorities — written for leadership, not just IT.
Findings Register
Every identified gap documented with evidence, business impact, exploitability rating, and recommended remediation.
Prioritised Roadmap
A sequenced remediation plan ordered by real-world risk, not theoretical severity scores. Includes effort estimates and quick wins.
Budget Guidance
Honest cost estimates for remediation — so you can plan, prioritise, and make the business case internally.
Frequently asked questions
What is a cybersecurity assessment?
A cybersecurity assessment is a systematic review of an organisation's security controls, technology, processes, and people to identify gaps, quantify risk, and produce a prioritised remediation roadmap. Unlike a penetration test, an assessment does not involve active exploitation — it evaluates your security posture holistically.
How long does a security assessment take?
A standard assessment for an SMB environment takes 5–10 business days: 2–3 days of data gathering and interviews, followed by analysis and report writing. Larger or more complex environments take longer. We agree scope and timelines before starting.
What is the difference between a security assessment and a penetration test?
A penetration test actively attempts to exploit vulnerabilities to demonstrate impact. A security assessment is broader — it covers your policies, processes, people, and technology to give you a complete picture of your security posture. Many organisations benefit from doing both.
Do you help with Cyber Essentials certification?
Yes. We conduct Cyber Essentials gap assessments and can guide you through the certification process. Cyber Essentials is a UK government-backed scheme covering five key technical controls — we assess your current posture against all five and help you remediate before assessment.
Will the findings be presented to our board?
If required, yes. We can prepare and deliver an executive presentation of findings tailored for a non-technical audience. Board-level understanding of cyber risk is a key part of effective security governance.
Know where you stand before an attacker finds out for you
Book a free 30-minute briefing. We will give you an honest initial view of your biggest risk areas at no cost.
Book a free briefing →