Our review includes looking at businesses, processes and controls, operations, technology, business strategy, internal communications, risk management, staffing, training, insurance cover and regulatory compliance.
We will also provide guidance on proactive steps to be taken to minimise the risk and impact of your business suffering a potential cyber attack, including:
Business Continuity – examining disaster recovery systems, identifying what has been hacked, responses of your suppliers and contractors
Business Critical Contracts – assessing what your key contracts say about data, security measures and cybersecurity and warranties
Your Key Assets – reviewing assets and information critical to your business which if compromised could severely damage your business, such as intellectual property and regulated data
Data Protection and Privacy requirements – obliging suppliers to implement appropriate technological and organisational security measures against unauthorised or unlawful processing of data (such as by hackers)
Incident Response and Recovery Strategy – working with you to formulate a clear process and systems for dealing with cyber and data attacks, ensuring everyone in your team knows their responsibilities and the process to follow if an attack takes place
Liability – anticipating and mitigating liabilities such as data damage or loss, privacy infringements, denial of service and lost income.
Remedies – identifying liquidated damages which could be payable for the duration systems are down
Insurance – advising on appropriate options for insurance cover
Replacement systems – identifying replacement, mirror or alternative platforms so that it can continue to operate should there be a future cyber attack.
Staff training – maintaining crisis plans long after we’ve completed the Audit.View less