01
IDENTIFY

To set up effective defenses you need to know what you need to protect. The main aspects to identify are:

Data:

What is it and how sensitive is it?

Devices:

What devices can access the data? What are they running?

Locations:

Where is that data? Where are those devices? How can we safely support the way users work?

In most cases, we recommend starting with an assessment. If you already have something in place, it will consolidate the effectiveness of your current systems. If you do not, it will give you a starting point and a plan.

Our Cybersecurity Assessment was designed for exactly this. It is primarily an agent-based assessment which makes it fast and cost efficient. It provides information that can facilitate a fact-based discussion about the necessary next steps.

Consolidate what you have and get a step-by-step plan to become more Cybersecure.

Talk to us to schedule your assessment today

You can find more information about the Identify Phase of the Five Functions of NIST here.