fbpx Skip to main content

Cyber

Review

The rapid rise of cybercrime results from a lower technical barrier of entry for cybercriminals. Therefore, ensuring that your organisation is protected against disruption and reputational damage has never been more critical.

A Strategic Cyber Review will thoroughly assess the use of technology across the organisation. Our methodology will help you rapidly improve your company’s IT security stance with Cyber risk management strategies that will help your business face today’s cyber security threats.

Find Out MoreFind Out More
CSIQ-Cyber-Consulting-Header

Who is a Cyber Review for?

The Cyber Review can be tailored to suit businesses of all types and sizes. It’s ideal for helping organisations to understand their overall IT and security posture and protect against cyber threats. A Cyber review is also ideal for organisations looking at acquisitions or mergers.

What do we review?

  • Documentation / Policies and Training
  • Governance & Compliance (Maturity Assessment)
  • Identity Access Management: Active Directory/Azure AD
  • Use of public cloud technologies
  • IT Strategy and Support
  • Network Perimeter Security
  • Remote Working
  • Wireless Security
  • Backup & Business Continuity
  • Website
  • Cyber Intelligence
  • Internal Security
csiq-square-with-circuit-cut-out
CSIQ-Cyber-review-who-2
csiq-background-breaking-squares-3
CSIQ-Cyber-Review-Why

Why have a Cyber Review?

  • It provides independent assurance of security controls
  • It Improves awareness and understanding of cyber security risks
  • It helps gain the insight needed to prioritise future security investments
Find Out MoreFind Out More

Cyber Security Simplified

Our services are built to be cost-effective while maximising risk reduction. All consultancy and managed solutions provide actionable results that protect your business from opportunistic to advanced persistent threats.

35

of businesses surveyed identified a security breach in 2022

21

of businesses were attacked at least once in 2022

43

of organisations have cyber insurance cover

Benefits of a Cyber Review

It provides a review of the entire IT estate, including infrastructure and use of technologies

It gives remediation and best practice recommendations to help with security risk reduction

It tracks remediation progress over time using our insight risk management platform

It gives a roadmap with milestones and timescales for the next 5 years

It provides a detailed audit report outlining each of the technical domains reviewed

For any questions about our Cyber Review services, visit our FAQs page, or contact us here.

Our Unique Approach: Bringing Enterprise-Grade Cyber Solutions to SMEs

At CSIQ, we specialise in cyber consultancy and engineering uniquely tailored for SMEs in the United Kingdom. We dismantle the complexities of cyber operations, empowering your business with top-tier security solutions and enabling success without barriers.

Adversarial Mindset: Understanding the Attacker for Stronger Defence

Our extensive experience in pen testing, red teaming, and ethical hacking across the UK equips us with a profound understanding of adversarial tactics. We provide you with unparalleled insights and strategies to fortify your defences against the most cunning cyber threats.

CSIQ-Background-Right-12png
CSIQ-Adversarial-Mindset
CSIQ-Background-left-12
CSIQ-Outcome-Focussed-v2

Strategic Cyber Partnership

We go beyond typical security services by immersing ourselves in your business challenges. Our approach, shaped by diverse industry experiences, delivers practical, actionable guidance, enhancing your network security and easing the management load.

Exceptional Quality: Your Priority, Our Commitment

Our commitment to exceptional support is unwavering. With a responsive and approachable team, we assure hands-on assistance, ensuring your cyber security needs are met with utmost dedication and quality.

CSIQ-Background-Right-12png
CSIQ-Excellent-Quality-2
CSIQ-Background-left-12
CSIQ-Technology-Agnostic-2

Technology Agnostic: Custom Solutions for Every Client

We understand that every client is unique. Our technology-agnostic approach ensures selecting and managing the right technologies, integrating them seamlessly into a unified platform for optimal effectiveness.

Results-Driven Projects: Dedicated and Timely Delivery

Your priorities drive our projects. Each initiative is managed with focused attention and commitment, led by a dedicated project manager and technical lead. Our promise is timely delivery with consistent quality, ensuring your projects meet their objectives every time.

CSIQ-Background-Right-12png
CSIQ-Forward-Thinking-2

Cyber Review: Feature Comparison

Cyber Review
Core

  • Project Engagement
  • Prerequisite Checks
  • Project Scoping
  • Mutual Non-Disclosure Agreement
  • Organisation Risk Profile
  • CSIQ Core Quessionnaire
  • Rules of Engagement
  • Threat Modelling
  • Operation Requirements
  • Setup Client Portals
  • Ship CSIQ Recon to Site
  • Project Outputs
  • Bespoke Report
  • Security Positioning Model and Rating
  • Risk Reduction Plans
  • Presentation of Findings
  • Timeline of Events (Detailed Audit Log)
  • SWOT Analysis
Cyber Review
Strategic

  • Project Engagement
  • Prerequisite Checks
  • Project Scoping
  • Mutual Non-Disclosure Agreement
  • Organisation Risk Profile
  • CSIQ Strategic Quessionnaire
  • Rules of Engagement
  • Threat Modelling
  • Operation Requirements
  • Setup Client Portals
  • Ship CSIQ Recon to Site
  • Project Outputs
  • Bespoke Report
  • Security Positioning Model and Rating
  • Risk Reduction Plans
  • Presentation of Findings
  • Timeline of Events (Detailed Audit Log)
  • SWOT Analysis
Cyber Review
Core

  • Core Systems and Software
  • Use of Technologies
  • Line of Business Applications
  • Licensing
  • Budgeting
  • Security Operations
  • Threat Management
  • Threat Detection
  • Threat Prevention
  • Threat Response
  • Automation and SOAR
  • Business Enablement
  • Remote Working
  • Mobile Technologies
  • BYOD
  • Cloud Computing
  • IOT (Internet of Things)
  • Data Analytics
  • BlockChain
  • Artificial Intelligence
  • Evaluation of Emerging Technologies
  • Security Architecture
  • Zero-Trust-Models
  • Defence in Depth
  • Backup & BCDR
  • Backup Health Review
  • Business Continuity Review
  • Disaster Recovery Review
Cyber Review
Strategic

  • Core Systems and Software
  • Use of Technologies
  • Line of Business Applications
  • Licensing
  • Budgeting
  • Security Operations
  • Threat Management
  • Threat Detection
  • Threat Prevention
  • Threat Response
  • Automation and SOAR
  • Business Enablement
  • Remote Working
  • Mobile Technologies
  • BYOD
  • Cloud Computing
  • IOT (Internet of Things)
  • Data Analytics
  • BlockChain
  • Artificial Intelligence
  • Evaluation of Emerging Technologies
  • Security Architecture
  • Zero-Trust-Models
  • Defence in Depth
  • Backup & BCDR
  • Backup Health Review
  • Business Continuity Review
  • Disaster Recovery Review
Cyber Review
Core

  • Company Policies
  • IT Security Policy
  • Access Control Policy
  • Access Control Registers
  • Risk Assessments
  • Asset Registers
  • Security Improvement Plan
  • Security Incident Response Registers
  • Business Continuity Plan
  • Business Continuity Test Report
  • Staff Awareness
  • Staff Cyber Awareness Test
  • Cyber Training Review
  • Compliance & Governance
  • Cyber Essentials / Plus
  • IASME Governance
  • ISO 9001
  • ISO 22301
  • ISO 27001
  • PCI DSS
  • CIS
  • STIG
  • SOC1/2
  • GDPR
Cyber Review
Strategic

  • Company Policies
  • IT Security Policy
  • Access Control Policy
  • Access Control Registers
  • Risk Assessments
  • Asset Registers
  • Security Improvement Plan
  • Security Incident Response Registers
  • Business Continuity Plan
  • Business Continuity Test Report
  • Staff Awareness
  • Staff Cyber Awareness Test
  • Cyber Training Review
  • Compliance & Governance
  • Cyber Essentials
  • IASME Governance
  • ISO 9001
  • ISO 22301
  • ISO 27001
  • PCI DSS
  • CIS
  • STIG
  • SOC1/2
  • GDPR
Cyber Review
Core

  • Active Directory
  • Health and Best Practice Review
  • Password Policies
  • Stale Objects
  • Security Levels
  • Identify Weak Passwords
  • Non Repudiation
  • Account Creation/Deletion
  • Role Based Access Control
  • Password Reset/Self-Service
  • Single Sign On (SSO)
  • Separation of Duties
  • Identify Attack Paths
  • Azure AD Synchronisation
  • Azure AD Sync and Health Review
  • Secure Configuration Review
  • Azure AD
  • Health and Best Practice Review
  • Password Polices
  • Stale Objects
  • Conditional Access
  • Security Levels
  • Identify Weak Passwords
  • Non Repudiation
  • Latent Threat Analysis
  • Identify Attack Paths
  • Multi-Factor Authentication
  • Configuration Review
  • Productivity Suites
  • Microsoft 365 Review
  • G-Suite Review
  • Cloud Infrastructure
  • Fit/Usage Review
  • Microsoft Azure
  • Amazon Web Services
  • Google Cloud
  • Digital Ocean
  • Linode
Cyber Review
Strategic

  • Active Directory
  • Health and Best Practice Review
  • Password Policies
  • Stale Objects
  • Security Levels
  • Identify Weak Passwords
  • Non Repudiation
  • Account Creation/Deletion
  • Role Based Access Control
  • Password Reset/Self-Service
  • Single Sign On (SSO)
  • Separation of Duties
  • Identify Attack Paths
  • Azure AD Synchronisation
  • Azure AD Sync and Health Review
  • Secure Configuration Review
  • Azure AD
  • Health and Best Practice Review
  • Password Polices
  • Stale Objects
  • Non Repudiation
  • Security Levels
  • Identify Weak Passwords
  • Conditional Access
  • Latent Threat Analysis
  • Identify Attack Paths
  • Multi-Factor Authentication
  • Configuration Review
  • Productivity Suites
  • Microsoft 365 Review
  • G-Suite Review
  • Cloud Infrastructure
  • Fit/Usage Review
  • Microsoft Azure
  • Amazon Web Services
  • Google Cloud
  • Digital Ocean
  • Linode
Cyber Review
Core

  • Network Security
  • Network Security Health Review
  • Network Shares & File Sharing
  • Data Exfiltration Channels
  • Network Services (DNS/SQL etc)
  • Other (Printers/CCTV/Alarms)
  • Switch and Router Review
  • Network Segregation
  • SQL Server Network Security
  • IOT (Internet of Things)
  • Supporting Infrastructure
  • Infrastructure Health Review
  • Windows Server
  • Windows Desktop
  • Linux Server
  • macOS Server
  • Exchange Email Services
  • Desktop Virtualisation
  • Streaming Applications
  • SQL Server Configuration
  • Server Hardware
  • Software Licensing
  • Uninterruptible Power Supplies
  • Storage Infrastructure
  • Server Room Environment
  • Client Security
  • Client Security Health Review
  • Two-Click Rules
  • PowerShell Security
  • Privileged Users Audit
  • Device Encryption
  • Device Patching
  • Third Party Application Patching
  • Hardware and Firmware Support
  • AppLocker Policies
  • Software Restriction Policy
  • Mobile Device Management
  • Anti-Malware Effectiveness
  • Mitre & Attack Tests
  • Device Guard Configuration
  • Credential Guard Configuration
  • Privilege Escalation Checks
  • Application Security Checks
  • Rogue Applications
  • Physical Security
  • Physical Security Review
  • Door Access Control Systems
  • Comms Room Physical Security
  • Site Perimeter Security
  • Wireless Security
  • Wireless Configuration Review
  • Site Walk and Heat Map
  • Network Segregation
  • Guest Access Review
Cyber Review
Strategic

  • Network Security
  • Network Security Health Review
  • Network Shares & File Sharing
  • Data Exfiltration Channels
  • Network Services (DNS/SQL etc)
  • Other (Printers/CCTV/Alarms)
  • Switch and Router Review
  • Network Segregation
  • SQL Server Network Security
  • IOT (Internet of Things)
  • Supporting Infrastructure
  • Infrastructure Health Review
  • Windows Server
  • Windows Desktop
  • Linux Server
  • macOS Server
  • Exchange Email Services
  • Desktop Virtualisation
  • Streaming Applications
  • SQL Server Configuration
  • Server Hardware
  • Software Licensing
  • Uninterruptible Power Supplies
  • Storage Infrastructure
  • Server Room Environment
  • Client Security
  • Client Security Health Review
  • Two-Click Rules
  • PowerShell Security
  • Privileged Users Audit
  • Device Encryption
  • Device Patching
  • Third Party Application Patching
  • Hardware and Firmware Support
  • AppLocker Policies
  • Software Restriction Policy
  • Mobile Device Management
  • Anti-Malware Effectiveness
  • Mitre & Attack Tests
  • Device Guard Configuration
  • Credential Guard Configuration
  • Privilege Escalation Checks
  • Application Security Checks
  • Rogue Applications
  • Physical Security
  • Physical Security Review
  • Door Access Control Systems
  • Comms Room Physical Security
  • Site Perimeter Security
  • Wireless Security
  • Wireless Configuration Review
  • Site Walk and Heat Map
  • Network Segregation
  • Guest Access Review
Cyber Review
Core

  • Firewalls
  • Network Perimeter Health Review
  • Device Configuration Review
  • Access Rule Review
  • Data Exfiltration Testing
  • Intrusion Detection Effectiveness
  • Intrusion Prevention Effectiveness
  • Denial of Service Protection Testing
  • Gateway Security
  • Web Filtering Security
  • Email Security
  • Multi-Factor Authentication Review
  • Connectivity
  • Usage and Configuration Review
  • Remote Desktop
  • Remote Working Technology Review
  • Citrix Virtual Apps and Desktops
  • Remote Desktop Services (RDS)
  • Virtual Private Networking (VPN)
  • Configuration Review
  • Company Website
  • High Level Health Review
  • Configuration and Site Security
  • Vulnerability Assessment
Cyber Review
Strategic

  • Firewalls
  • Network Perimeter Health Review
  • Device Configuration Review
  • Access Rule Review
  • Data Exfiltration Testing
  • Intrusion Detection Effectiveness
  • Intrusion Prevention Effectiveness
  • Denial of Service Protection Testing
  • Gateway Security
  • Web Filtering Security
  • Email Security
  • Multi-Factor Authentication Review
  • Connectivity
  • Usage and Configuration Review
  • Remote Desktop
  • Remote Working Technology Review
  • Citrix Virtual Apps and Desktops
  • Remote Desktop Services (RDS)
  • Virtual Private Networking (VPN)
  • Configuration Review
  • Company Website
  • High Level Health Review
  • Configuration and Site Security
  • Vulnerability Assessment
Cyber Review
Core

  • Cyber Threat Intelligence
  • Public Email Addresses
  • IP Reputation
  • Search Engine Leaks
  • Public DNS Health
  • Public Email Health
  • Dark Web Chatter
  • Credential Loss Investigation
  • Developer Code Leaks
  • GitHub
  • GitLab
  • code.google.com
  • bitbucket.org
  • searchcode.com
  • pastebin.com
  • Social Media Profiling
  • Social Media Usage
  • Identify Social Engineering Opportunities
  • Business Footprint Assessment
  • Sensitive Information Leakage
  • Identify Persons of Interest
Cyber Review
Strategic

  • Cyber Threat Intelligence
  • Public Email Addresses
  • IP Reputation
  • Search Engine Leaks
  • Public DNS Health
  • Public Email Health
  • Dark Web Chatter
  • Credential Loss Investigation
  • Developer Code Leaks
  • GitHub
  • GitLab
  • code.google.com
  • bitbucket.org
  • searchcode.com
  • pastebin.com
  • Social Media Profiling
  • Social Media Usage
  • Identify Social Engineering Opportunities
  • Business Footprint Assessment
  • Sensitive Information Leakage
  • Identify Persons of Interest

CSIQ Insight: Risk Management Portal

All consultancy and managed services include access to our Risk Management Portal.

A Single Pane of Glass

All risk types, including technical, human, residual and inherent, are allocated a score, allowing for a strategic approach to risk reduction.

Monthly Reports

Monthly reports from our managed services detailing individual risk scores, a summary of events, detailed vulnerabilities, and security recommendations are all available from the platform.

Visual Attack Path

Multiple vulnerabilities are typically exploited to reach a target. Our platform visualises the attack path taken by your consultant to achieve the objective.

Trend Analysis

Track your exposure over time to ensure that your IT teams are tackling the vulnerabilities identified.

If you have our pre-pay contract, simply send us a message through the platform to assist with the remediation.

Flexible Pre-Pay Contract

Benefit from 25% off and rapid response with our Pre-Pay Contract

Journey to understanding your Cyber Security position

CSIQ-Journey-to-understanding-your-Cyber-Posture
1
Non-Disclosure Agreements
2
Scoping Questionnaire
3
Information Discovery
4
Threat Modelling
5
Present Findings
6
Feedback & Evaluation
7
Post engagement support

Journey to understanding your Cyber Posture

1

Non-Disclosure
Agreements
2

Scoping
Questionnaire
3

Information
Discovery
4

Threat
Modelling
5

Present
Findings
6

Feedback &
Evaluation
7

Post Engagement
support
CSIQ-Footer-Logo-4

Cyber Consulting

Services

To find out more about the range of cyber consulting services that we can help your business with, visit our cyber consulting page. 

Or get in touch to discover all of our available services.

Contact UsContact Us

Our Accreditations & Memberships

We are proud of our industry recognised certifications in Cyber Security and Service Delivery

CSIQ NCSC Assured Service Provider Cyber Advisor
Cyber Essentials Plus Certification Body
IASME Governance Certification Body
CSIQ IASME Cyber Baseline Certification Body
ISACA Professional Members
Ecologi - Climate Positive Workforce

FAQ

What is a Cyber Review?

A Cyber Review (Or Cyber Security Review) provides an objective and comprehensive assessment of an organisation’s ability to secure its information assets from the impact of cyber threats.

The goal of a Cyber Review is to determine and validate the effectiveness of cyber security measures. It also detects IT system vulnerabilities and correlates them with potential internal and external cyber threats.

For start-ups, we recommend reviewing the NCSC 10 steps to cyber security, which lays the foundations for building cyber resilience in your organisation.

How does a Cyber Resilience Review Compare?

A Cyber Resilience Review (CRR) is an assessment method developed by the Department of Homeland Security in the United States. The methodology of our bespoke Cyber Review covers the same domains and more while remaining relevant to the United Kingdom and European markets.

How long does it take to complete a Strategic Cyber Review?

The Strategic Cyber Review will typically take 30 days from project start to completion. This time depends on the client providing our consultants with access to the required resources.

Have a question for us about our services?

Send us an enquiry to get a rapid response from a cybersecurity expert.

"*" indicates required fields

Name*
Hidden
Hidden
This field is for validation purposes and should be left unchanged.