Security Audit

As we move to the Digital World, the more we put our trust in technology and the more we make data available. As companies embrace the cloud and the associated business value, they must adopt new security architectures and processes to protect their cloud workloads. Digital Transformation is not just about the delivery of business value but also the security of the systems and applications. Every week there are stories of how companies have suffered a data breach, exposed their customer’s data and impacted their business and brand. Understanding your current security situation is critical so, has your risk posture changed? NWT recognise that our Security Audit can be an important step in helping to answer that question.

A security audit is one of the ways that an organisation can test and assess their overall security posture, including cybersecurity. Security audits help to protect critical data, identify security loopholes, create new security policies and track the effectiveness of security strategies. Regular audits can help ensure employees stick to security practices and can catch new vulnerabilities. It is a systematic evaluation of the security of a company’s information system by measuring how well it conforms to an established set of criteria. A thorough audit typically assesses the security of the system’s physical configuration and environment, software, information handling processes and user practices. We will also investigate the cybersecurity policies and the assets on the network to identify any deficiencies that could put you at risk of a security breach.

The process is straightforward. We need to assess the state of your current IT security, identifying any vulnerabilities and prioritising the areas for improvement. We then need to describe the target state for your future IT security and plan your actions to reach there. We will use the audit in order to:

• Identify security problems and gaps, as well as system weaknesses
• Establish a security baseline that future audits can be compared with
• Comply with internal organisation security policies
• Comply with external regulatory requirements
• Determine if security training is adequate
• Identify unnecessary resources

During a security audit, each system an organisation uses may be examined for vulnerabilities in the following areas:

• Network vulnerabilities
• Security controls
• Software systems
• Architecture
• Telecommunications
• Systems development
• Information processing
• Encryption

To be comprehensive, you may need more than a Security Audit as that only measures an information system’s performance against a list of criteria. A vulnerability assessment is a comprehensive study of an information system, seeking potential security weaknesses. Penetration testing is a covert approach in which a security expert tests to see if a system can withstand a specific attack.

NWT also has other areas where we can provide services to support the Security Audit.

HIPS Service

Our host intrusion prevention system (HIPS) service places multiple guards behind the front line of each system protecting from internal attacks. If the attack is serious, our highly trained cyber security analysts will remove the machine and investigate the cause

Advanced Inspection Service

Our IPS/IDS service protects your network. With around the clock support from our team, we ensure all traffic going in and out of your network is analysed, and any malicious traffic is stopped and permanently blocked

Firewall and Load Balancers

Checkpoint and Cisco devices form the heart of our offering, deployment and ongoing management and monitoring of these devices in line with best practice and compliance requirements for our customers

Patching Services

Our patch management service pushes any new updates published by the vendor to your machines automatically. Deploying the patches as soon as they are released means any exploits taking place will be prevented quickly

Security Audit

Penetration Testing

Vulnerability tests are run on an agreed customer target list of addresses, run from internal and external sources using a multitude of industry tools and scanners. The testing outputs are combined into a vulnerability report which is shared with you and tracked to resolution

SIEM Service

Our Security, Information and Event Management (SIEM) service provides a unified view of your network by pulling together all your different services and applications used within your infrastructure. We monitor your network to ensure no attacks are happening or trying to happen.

After the Audit – Making it happen with NWT

There are clearly numerous ways to approach an assessment. Unfortunately, many businesses or organisations do not know which framework will be the best for them and their teams. This is an important decision as it can influence future work and the efficiency and effectiveness of its delivery and operation.  A framework leaves room for other internal practices and tools to be included but provides much of the process required. For example, the NWT Cybersecurity  Maturity Model is a pattern intended to guide a business to make informed choices.  This model is where we challenge the assumptions, conceptions and biases of the existing ways of working. We look for the best way forward and the outcomes that will deliver true business value. We have an approach that is focussed on achieving a `transformed operation` and helping to develop solutions that reduce the business risk.

Security Audit

For NWT it is about having an approach to solve business challenges and use an approach to avoid reinventing the wheel each time for each engagement.  NWT is also about having an approach that gets the assessment completed quickly and does not result in philosophical debates around the processes for change.

The NWT Cyber Maturity model examines the business requirements, cyber capabilities and cyber management, in relation to management and response, and the operating model.  NWT also uses our 5D Framework to help define the current state and the future state for the business.

A common formula used to by Security Analysts to describe the security risk is: Risk = Threat x Vulnerability x Consequence. Organisations must decide which information-security risks they willingly accept and where to invest to stay in balance. Our Security Audit can help inform that journey. We believe that security is for life, not just to pass an audit. Everyone can stay connected in the new world, we just help you to make sure that they do so securely without impacting your ability to operate.

New World Examples