Select regional store:

IT Health Check


What is an IT Health Check?

An IT Health Check (ITHC) provides an independent assessment of your organization’s cybersecurity. 

It aims to provide assurance that your organization’s external and internal systems are protected from unauthorized access or change, and they do not provide an unauthorized entry point into your 3rd parties systems that consume.

The scope of an ITHC engagement will generally include:

  • External/internal network and systems vulnerability assessment 
  • External/internal network and systems penetration testing 
  • Web application penetration testing
  • Host configuration security review
  • Database configuration security review
  • Firewall configuration security review

Once identified, the vulnerabilities are presented in a report that provides clear, measurable results along with effective risk remediation solutions.

COVID-19: remote delivery options

We would like to reassure our clients that all training and consultancy services will go ahead as scheduled during the current COVID-19 situation. As a company that fully embraces flexible and remote working, we are adjusting our delivery methods to allow us to provide consultancy services, penetration tests, and training remotely where necessary. Please also refer to our COVID-19 policy.

Is an IT Health Check right for you?

The ITHC is designed to provide assurance that your external and internal systems are protected from unauthorized access or change through assessments of protective monitoring controls and remote working devices, as well as others.

The benefits of completing an IT Health Check

Our penetration tests will help you to:

  • Gain real-world insight into your vulnerabilities
  • Scope your ITHC to conduct a tailored risk assessment
  • Designed to demonstrate to 3rd parties that your network is secure
  • We can recommend appropriate and cost-effective action that is required to address any areas of high risk
  • Connect to other 3rd parties securely

Our engagement process

Our CREST accredited penetration testers follow an established methodology based primarily upon the Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) security risks. This approach will emulate the techniques of an attacker using many of the same readily available tools.

  1. Scoping: efore testing, our account management team will discuss your ITHC requirements to fulfil your testing criteria.
  2. Reconnaissance: During this stage we will passively gather publicly available information that could aid the testing process. This covers the enumeration of usernames, email address, vulnerable version and previously compromised credentials.
  3. Assessment: Using the industry standard methodologies such as OWASP, OSSTMM and publicly available configuration guides, each area in scope will be tested to identify vulnerabilities and security weaknesses.
  4. Reporting: On conclusion of the testing the results will be fully analysed by an IT Governance certified tester and a full report will be prepared for the customer that will set out the scope of the test and the methodology used along with all the risks identified.
  5. Re-test: We can provide access to our testers and the raw test data to support and expedite remediation. We can also retest your systems so that you can be sure all the identified issues have been successfully resolved.

How IT Governance can help you 

We are pioneers in offering easy-to-understand and quick-to-buy penetration testing.

You can choose the level of penetration test to meet your budget and technical requirements.

We provide clear reports that can be understood by engineering and management teams alike.

CREST-accredited penetration testing services give you all the technical assurance you need.

Companies using our penetration testing services

This website uses cookies. View our cookie policy