IT security check CIS 18 controls
It's an effective tool to strengthen IT security
Get an assessment of your IT security with an IT security check
We help over 4,500 companies with IT security. Vi works with IT security every day - in close dialog with Danish companies. We know that good IT starts with trust, proximity and security. Whether you have an in-house IT department or not, we help you take control of your security.
An IT security audit provides a clear overview of your current security level and helps prioritize next steps.
It is an effective tool for strengthening IT security based on facts and best practices.
“It is very likely that cybercriminals will try to steal data and extort Danish organizations.”
- Laila Reenberg, Director, National Board for Community Safety. Read the full article here
The Danish Security Authority now assesses the threat at the top level of the national scale.
New official threat assessment: VERY HIGH. Unfortunately, the cyber threat to Danish businesses has never been greater.
At a time when cyber threats are evolving every day, it's more important than ever to know where your IT security actually stands.
Want to know how vulnerable your business is?
An IT Security Check gives you a quick, concrete and non-binding assessment of your security level. It only takes a few minutes to get started.
Fill out the form and we will contact you.
* Here you can read our privacy policy
What do you get with the report?
Whether you have an in-house IT department or not, we help you take control of your IT security.
The report is easy to use, even if you are not an IT expert.
You'll get a report with it:
✔ An overview of your risks.
✔ Prioritized action list.
✔ Concrete recommendations.
✔ Network and device security at a glance.
✔ Status of your Microsoft 365 Safety.
How an IT security check works
We have prepared a PDF that gives you an overview of what the IT security check includes and how the process works when you have an IT security check performed at IT Forum Gruppen.
See how we perform an IT SECURITY CHECK
If you can't watch the video? it's because you need to accept our cookies.
Click the icon (the round black circle) in the bottom left corner. Select "change your cozy" and "allow".
A key part of running a business involves IT systems
Despite the crucial importance of IT systems, it turns out that 1 out of 4 small and medium-sized businesses not have implemented essential security measures, such as monitoring or updating software and hardware. Cybercriminals are constantly trying to exploit vulnerabilities in the IT infrastructure to attack businesses.
Securing against a potential compromise can often be a confusing and resource-intensive process. A good place to start is by creating an overview of critical systems and data, making you aware of where in the organization it is particularly important to secure against attacks.
With an IT security check from IT Forum Group, you get an advanced and systematic review of your entire IT infrastructure based on the CIS 18 controls.
All technical devices, software and networks are addressed, also the human IT security measures such as IT policies are checked, as IT security is also very much about the daily use of IT in an organization.
WITH AN IT SECURITY CHECK, YOU GET:
- Complete IT infrastructure report
(Users, devices, software, hardware & systems) - Practical action plan in order of priority
- based on the CIS 18 controls - Strengthened documentation for compliance or NIS2
- Reporting to management or board of directors
HOW TO CONDUCT AN IT SECURITY CHECK WITH THE IT FORUM GROUP
Step 1/2
The IT security check begins with the security consultant from IT Forum Group starting a scan of your entire IT environment. This process will typically take place over a period of a couple of weeks.
The scan is summarized in Step 2 into a technical report that provides the consultant with the necessary basic knowledge and overview of devices on the network, software, hardware, etc. and their potential vulnerabilities.
STEP 3
The next step in the process requires the involvement of relevant key people in your company who have the necessary knowledge of your current IT environment. Depending on the technical insight and prior agreement, the CIS questionnaire is completed to a greater or lesser extent in collaboration with the consultant from IT Forum Group.
The purpose is to shed light on the company's IT security processes such as IT policies etc.
Step 4/5/6
The IT Forum Group prepares a comprehensive security report that provides a current overview of the security level.
The report also includes the recommended action plan on what security initiatives you as a company should implement and what effect these will have on the overall security level.
The report and action plan are presented and if desired, an implementation plan is agreed upon.
WHAT ARE THE CIS 18 CONTROLS?
The Center for Internet Security (CIS) has developed an internationally recognized IT security framework called CIS 18. The controls contain a series of prioritized, pragmatic and operational recommendations developed by industry experts from around the world.
These are continuously revised as the threat landscape changes. CIS focuses on the most preventive measures against cyber attacks such as malware, ransomware, privilege abuse, targeted intrusions and application hacking. Furthermore, CIS 18 controls are based on cost-effective security activities, meaning the highest value in the shortest time.
You can read more about the CIS 18 controls here.
Book a calls with us
Book a call below and we'll have a no-obligation chat about how we can best help your business with a IT security checks.
You are also welcome to call us on tel: 70 100 150 or write to kontakt@itf.dk
FAQ - IT security check
What is an IT security check?
And IT security check is a quick technical review of your IT environment where we scan for vulnerabilities, misconfigurations and risks.
You get a short report showing where you are at risk and what you need to do.
What does the check contain?
The check consists of three parts:
1. Scanning devices and networks.
2. Security check of Microsoft 365.
3. Debriefing meeting with review of results.
How long does it take?
The review itself typically takes 10-15 minutes.
What does an IT security check cost?
The check is free and non-binding.
You only pay if you want us to help fix any vulnerabilities found.
Why is an IT security check important right now?
The cyber threat to Danish companies has just been assessed at “Very high”, which is the highest level. A security check gives you an overview of whether you are vulnerable and what you should do first.
Is our data safe during the IT Security Check?
Yes. The scan only detects configurations, open ports, vulnerabilities and security parameters.
We get none access to your files, content or business data.
Is our data safe during the check?
Yes. The scan only detects configurations, open ports, vulnerabilities and security parameters.
We get none access to your files, content or business data.
Is the security check suitable for small businesses?
Yes - the IT security check is designed for small and medium-sized businesses that typically don't have the time or resources for deep security tasks.
It gives you a quick, easy-to-understand overview.