A security audit is a systematic evaluation of the security of a company’s information technology systems by measuring how well it conforms to an established set of criteria. A thorough audit assesses the protection of the system’s physical configuration and environment, software, information handling processes and user practices.
Security audits are often used to determine compliance with regulations such as the FCA, the Sarbanes-Oxley Act and SOC2 which specify how organisations must deal with and handle information.
These audits are one of three main types of security diagnostics, along with vulnerability assessments and penetration testing (carried out as an additional option through a third party). Security audits measure an information system’s performance against a list of criteria. A vulnerability assessment is a comprehensive study of an information system, seeking potential security weaknesses and ensuring that necessary security patches have been applied.
We will construct a security audit plan that is repeatable and update-able, we will then work through this plan on site assessing your systems and issue you with a remediation plan from our findings on site.
Once the remediations have been completed we will then issue you with an audit routine, based on your trade, data sensitivity and your business’s risks. Many businesses will do a security audit at least once a year. But they can also be done monthly or quarterly depending on your trade. Different departments may have different audit schedules, depending on the systems, applications and data they use. Routine audits, whether done annually or monthly, can help identify anomalies or patterns in a system.
If you are interested in a comprehensive cyber security audit for your business, contact one of our experienced IT support team today to discuss how we can help you.
When we solve a support ticket, clients are given the choice of leaving good or bad feedback along with an optional comment. We post the 10 most recent comments here automatically and in real-time. You can view even more on our reviews page.
Date | Name | Comments |
---|---|---|
Sep 20th | Lynn H | great service as always. many thanks |
Sep 14th | Longcroft O | Thanks so much Jack, all sorted. |
Sep 14th | Longcroft O | Fantastic as usual, thank you Lochie. |
Sep 14th | Amanda H | I hope the problem is solved. Sorry not to have been able to find another example of what went wrong. Definitely I can now get at the word document I was being blocked from. So, thanks for your prompt effective treatment! |
Sep 13th | Nigel B | Very practical and quick advice that made resolving the issue very efficient |
Sep 6th | Alexandra O | Very quick and solved the problem easily, thank you Jack. |
Sep 5th | Chris S | another one solved.... |
Aug 23rd | Adina I | Brilliant, thank you very much! |
Aug 23rd | Catherine E | Excellent |
Aug 22nd | Graham R | Excellent, as always. Thanks very much! |
© Purple Computing 2023
Website by Eldo™