Cyber Security Checks

Keep your business protected against evolving cyber threatswith an actionable stategy and regular scheduled checks

Ask an expert about cyber checks

Cyber Resilience Engineering Lifecycle

cyber resilience engineering CRE icon
Learn More

How resilient is your business to a cyber attack?

It's a hard question to answer, because cyber is a constantly evolving landscape. If you were attacked, how would your business fare? Do you have an emergency process ready to follow in the event of a breach?
The Cyber Resilience Engineering (CRE) Lifecycle provides a clear set of goals, objectives and practices that empower your business to address cyber threats as they evolve.
This ongoing lifecycle ensures you are prepared to withstand every type of cyber attack, strengthening your defences with each cycle.

Recommended: Quarterly workshop and review


Anticipate: We help you predict and prevent attacks by maintaining a state of informed preparedness
Withstand: Build and maintain systems allowing essential functionality that can contain or defeat attackers
Recover: Create processes to restore business functions to maximum extent possible following a successful attack
Evolve: Transform processes and behaviours and re-architect systems to minimise adverse effects from actual or predicted attacks

Dark Web ID Monitoring

threat assessment cyber security check
Learn More

See every piece of your data up for grabs on the dark web and act before you get breached

Costly data breaches often start when credentials are leaked onto the dark web and bought by the highest bidder in hidden chat rooms, unidenxed sites and more.
The award-winning Dark Web ID solution from ID Agent shows you all passwords, email addresses that have been compromised and are for sale on the dark web before a breach occurs.

Recommended: monthly monitoring service


    Analysed, validated data from across the dark web
    Get solid recommendations for added security measures
    Recommendations for staff training to mitigate more data thefts
    Security risk assessment
    Vulnerability risk assessment
    Real-time, verified threat intelligence for your security team
    640,000+ botnets, P2P networks, IRC channels and more


Phishing Simulation & Training

cyber resilience engineering CRE icon
Learn More

BullPhish ID from ID Agent empowers your teams to become your strongest point of cyber protection

90% of incidents that end in a data breach start with a phishing email. Educating your teams about potential security threats ensures they're ready to spot nefarious links, and quick to report an attack if they realise they've clicked a link in error.
This easy-to-use cloud platform provides you with all the tools you need for peace of mind when it comes to your employees, helping them ensure your security practices are met and achieve better data privacy compliance. 
Phishing kits are real-world and always current, including the latest COVID-19 threats.

Continuously monitor your security posture via the user-friendly dashboard

Detect: Monitor for stolen and compromised employee data in case your teams have reused passwords etc across multiple sites and platforms
Phish: Schedule up-to-the-minute simulated, customised phishing campaigns at random times to prepare your teams for the real deal
Train: Easy-to-understand, visually engageing training videos in 8 languages, including online quizzes to ensure content retention
Measure & track: Monitor your overall cyber security posture, including potential dark web compromise and phishing resistance campaign results
Email & landing page templates: Target for phishing resistance and security awareness with an extensive library of real-world templates
Campaigns: Target groups based on any criteria and schedule campaigns as needed including staggering sends to specific individuals or groups.

Penetration Testing

pen test icon
Learn More

Ready to put your security to the test?

We subject your networks to simulated real world attack scenarios to discover security gaps before a real cyber criminal can exploit them.
You receive a full report revealing how easily records, credentials, intellectual property, personally identifiable information (PII), cardholder data, personal, protected health information, data ransom, or other data could be stolen or compromised.
Please note: penetration testing alone is not sufficient to protect your business. It only gives a moment-in-time snapshot of your defences and must only be used to support continuous security measures.

Recommended: once per year unless there have been major changes to your infrastructure,
when we recommend a second annual check




ITHQ security experts will help you determine how to best protect your business data from future cybersecurity attacks.

    Identify your security vulnerabilities before a hacker does
    Plug any gaps in your information security compliance
    Test the response time of your information security team
    Fully understand the potential real-world effect of a data breach or cybersecurity attack
    Receive actionable remediation guidance

Threat Assessment

threat assessment cyber security check


Learn More

Good cybersecurity starts with knowing how vulnerable your business is to attack

Have you ever run a threat assessment tool across your networks to identify vulnerabilities, your attack vector or performance dips?
If so, how long ago?
We deploy a FortiGate high performance firewall onto your system to conduct your Cyber Threat Assessment Program (CTAP).

Run 4 report cycles per year to support your ongoing cybersecurity program



    Your network's current security accuracy
    Application and web resources usage
    Peer-to-peer, social media, instant messaging usage and more
    Analysis of application traffic and bandwidth requirements
    Malware / botnet vulnerabilities and 'at risk' network devices
    Assessment of user productivity
    Network performance


Let's make your business cyber resilient

We love helping businesses like yours. No sales pitches, just sound cyber advice. Book an into chat with one of our team.

Cyber Security

Cyber security shield

Protect your data & your brand

Hybrid Cloud

cloud network concept

Optimise your infrastructure

Digital Working

Cyber security shield

Empower your teams

Data Analytics

Cyber security shield

Unlock the value in your data