Call us on
01732 762675
Akita logo

Security Audits

Let Akita’s team of experienced IT consultants conduct a security audit of your network, devices and software, as well as ensure staff IT policies and procedures are in place.

IT security is an ongoing battle. With new viruses and malware threats emerging all the time, no organisation can afford to be complacent.

But IT security is about much more than simply checking that hardware, software and systems are secure (though this is important). Information from the ICO indicate that as many as 88% of UK data breaches are caused by human error. As such, when it comes to reviewing IT security organisations need to adopt a holistic approach.

It’s for this reason that Akita offers customisable security audit services that cover all the ways that an organisation interacts with its IT.

Process for security audits

Our security audit process will be tailored to your organisation and its needs. The risk profile of a company involved in financial services, for example, will be different to a manufacturer, so we aim to tailor our approach inline both with our understanding of threats, and any specific requirements an organisation may have.

Our security audits are undertaken by our experienced IT consultants. Though custom to each organisation, audits will typically cover:

Consultancy: We start by understanding your organisation, its operations, its goals and growth aims. We will then review the IT systems, processes and policies you have in place currently to give a base understanding of your risk profile and specific areas to be investigated.

Vulnerability checks: Using market-leading software we can assess your IT infrastructure, devices and applications for errors, malware and security gaps. As and when gaps are identified we will interrogate further to see exactly the extent that risk they pose to your organisation and data.

We can also undertake PCI scanning if your organisation is one that handles card payments.

Procedural review: This is a broader exercise that covers processes and internal policies. This can range from the way that data is stored and backed up in the organisation, as well as who has access to it. It can also be an assessment of existing staff training and procedures, and may even involve an exercise in testing staff’s awareness of protocol and best practice.

Reporting: Once all assessments are finished, we produce a report outlining findings across all areas. This will establish the severity of the risks uncovered and outline the recommended improvements that need to be made to systems and processes

Remediation & Retesting: Optional to your needs, Akita can assist with the deployment of solutions to remedy your security risks. This may be configuration assistance, hardware or software upgrade, advice on policies or assistance with staff training or completion of education programs such as Cyber Essentials.

We can then retest to check that issues are resolved.

When should I undertake a security audit?

Organisations should periodically review their security as part of process. Key triggers may be:

  • Following significant modification to systems or the addition of new software
  • After taking on new staff
  • On review of HR policies
  • After an office move
  • Following a business merger or acquisition

Software audits

Together with our partners, Akita can also offer software audits, reviewing many forms of custom apps, programs and systems from a security point of view. Depending on your specific requirements this can include both a review of software code and an assessment of the means of deployment.

For more information about security audits please get in touch.

Other services Contact us