Cyber Security Assessment
In less than 5 minutes, complete an online assessment of your Operational Technology (OT) Systems by answering a few questions.
On completion you will receive a personalised overview and the option to download a in-depth report highlighting the strengths, weaknesses and next steps we recommend to help you and your OT system become secure.
The benefits of completing this assessment
Your Operational Technology (OT) system is bespoke to your operation and operates in a environment with limited downtime across a large estate or multiple locations. All this combined opens your OT system up to cyber and operational risks. To prevent any operational disruptions to your OT system, you need to know what equipment is operating on your network, how secure it is and who has local or remote access to be able to detect threats and overcome vulnerabilities.
The risk of cyber attacks on OT networks is unprecedented. As aging OT systems operate on unsupported equipment with limited or no spreads readily available vulnerabilities are increased. Any unplanned downtime could result in a loss of revenue or loss of critical data.
By completing a Cyber Security Assessment, you will receive a personalised report with your current business vulnerability position and recommended steps to improve along with how we can help your on your cyber journey.
How does the assessment work?
Fill out your name and company name.
Answer yes/no questions based on five key areas.
Your assessment score will be calculated automatically.
Receive a complimentary personalised report.
Policies and procedures
System maintenance & security
We are an established systems engineering company who specialise in designing, building and supporting
mission-critical control and communication systems.
We have worked globally in the airport, rail, road, marine and automation sectors and have delivered flagship projects for clients such as Heathrow Airport, Transport for London and other international transport operators.
We have over 20 years experience designing bespoke Operational Technology (OT) systems that operate around the clock, 365 days a year and specialise in maintaining OT systems running on legacy equipment. We can also offer additional services to help your OT system meet full accreditation to standards such as ISO27001.
From detailed risk assessments of your system vulnerabilities to creating test environments that can test software patches before implementation on the live system. We can also create and update any policies and procedures identifed as being required for your standard.
We will work in line with the cyber security standards that your business is required to meet or, in the case where you do not have a specific cyber security standards, we would recommend the standard to be followed.
Depending on your business and system requirements we would carry out a range of services. Examples of the type of services we provide are listed below:
• Site Survey
• Stakeholder Engagement
• System Maintainers Engagement
• Procedures/Policy Review
• Procedures/Policy Update
• System Zone Map
• Endpoint Protection
• Penetration Testing
• System Maintainers Engagement
Find out more on our website ➜