Contact




    How exposed is your company to cyber attacks?

    Consult our security experts, identify your gaps and gain peace of mind

    What is an IT security audit? How is an IT security audit carried out? What is the role of an IT security audit? Does my company comply with IT security regulations?

    In addition to the growing number of cyber-attacks and the need to protect against them, the entry into force of the new Federal Data Protection Act (DPA) requires companies to have adequate data security in place. To find out whether your company is minimally protected against cyber-attacks and compliant with the DPA, here’s a list of questions to ask yourself:

    • Do you have an IT security policy that enforces compliance with best practices and is well communicated within the organization?
    • Are your procedures, management processes and IT infrastructure inventory well documented and regularly updated?
    • Are your workstations, servers and applications adequately protected against threats?
    • Do you have immutable and regularly tested backups for your critical IT assets?
    • Do you have an incident response plan covering, among other things, cyber-attacks?

    The IT security audit is an in-depth examination designed to assess your level of exposure to cyber-attacks and your level of compliance with legal requirements, such as the Data Protection Act (DPA), in terms of data security.

    Why carry out an IT security audit?

    Meanquest proposes three levels of intervention with offers perfectly adapted to the needs of SMEs of all sizes:

    Have a security expert draw up an inventory of your organization’s compliance with the obligation to ensure data security, as required by the Data Protection Act.

    Evaluate your level of IT security

    Identify potential vulnerabilities and security holes in your IT systems

    Submit pragmatic recommendations to achieve an acceptable level of risk for your sensitive and confidential data

    Areas audited

    Governance of
    information
    security

    Information
    System

    Resources
    humans

    Steps in a security audit for information systems

    Analysis and understanding of your organization's context

    • Identification of your needs and expectations through management interviews
    • Interviews with IT and HR infrastructure managers

    Overview and analysis of IT security

    • Analysis of the level of compliance and maturity of information security governance (roles and responsibilities, business continuity and recovery plan, etc.).
    • Analysis of the level of cyber exposure linked to your information systems (management of IT assets, identifying flaws, weaknesses, vulnerabilities, access, malware, hackers, etc.).
    • Analysis of HR management compliance and cyber exposure linked to human risk (recruitment, training & awareness, end of collaboration).

    Audit report and recommendations for safety management

    • Report including a risk analysis of cyber-attacks by malware, for example, and recommendations for dealing with the risks identified
    • Presentation session of the draft IT security audit report
    • Transmission of a final report via a secure platform

    Confidentiality

    The auditors undertake to treat all data, access, information and documents concerning the Company as confidential.

    Further information about our audits

    • Exclusions
      • Document templates
      • Correcting critical vulnerabilities and security flaws
      • Implementation of a cybersecurity management system
    • Possibility of correcting any security flaws detected (see service offering)
    • Possibility of combining IT security audit with penetration testing

    A scalable offering

    This audit can be integrated into a gap analysis or ISO 27001 internal audit. Following this, our teams will be able to support you throughout the process of obtaining ISO 27001 certification.

    Our strengthss

    Protection

    Data protection and information security are our core business

    Certification

    We are ourselves an ISO 27001-certified organization.

    Expertise

    Our certified experts benefit from hands-on experience in entities of all sizes and types

    Our team will support you throughout your data security process to help you achieve your compliance and security objectives.