Services
ICT RISK ASSESSMENT, SECURITY AND BUSINESS IMPROVEMENT
Introduction and Objectives
The purpose of this Information Communication Technology (ICT) Health check and risk assessment is to evaluate the system's internal control design and effectiveness. This includes, but not limited to, efficiency and security protocols, development processes, and ICT governance and oversight.
To determine that administrators responsible for security always ensure that controls are installed as intended, if they are effective, if any breach in security has occurred and if so, what actions have they taken to prevent future breaches. These inquiries and other things will be answered by this Information Technology risk assessment e.g. antivirus, access control management for ICT systems, system logs, incident management and security policies.
To determine that all ICT Infrastructure are working optimal and turnaround time is optimal. ICT is aligned with the business objective. There are good returns on investment. Users are comfortable working with their systems.
To determine if existing computer systems meet present and future needs of your organization. Workstations not compliance will be upgraded with ICT devices like Network cards (NIC), wireless access, current operating systems, Hard disk and adequate Memory cards for systems optimal functions. High end devices like Routers, Firewall, Switches and Servers will be review.
Proposed work to be done during Health Check and Risk Assessment
Systematic review of all ICT infrastructure to ascertain if these said objectives and task above are in place e.g., security, technical knowledge by administrators, Business Continuity Plan (BCP) e.g. primary and backup devices (for critical devices) adequate power infrastructure when PHCN goes off, data storage to avoid loss of data, primary, backup data Centre and Security cameras are in place etc
This sample table below will be completed at the end of the risk assessment for computer systems in your establishment
| PC | Window Type | Processor | Memory (RAM) | System Type | Network device | Power Rating | Anti Virus Status/Security
| Remark |
| ACL01 | 10 | Intel Pentim CPU 4040M @4.8Gz 4.8GHz | 8GB | 64 bit OS | | | | |
Computer systems arrangement shall be review to determine they meet best practice as shown on page 2. This is to determine that your network is not flat. In line with best practice it should be well segmented.
Recommendations/Conclusion
All our findings and observations will be reported in the final report of this risk assessment should you give us green light. We shall also state the implication and risk associated with all findings. Lastly we shall recommend solutions to all findings in line with best practice. Please note that all information will be treated with utmost confidentiality. We are willing to sign non disclosure agreement with you.
WHAT NEXT?
If you'd like to know more about your ICT infrastructure state, need more information or advice, then please contact us today on Arinze.umeche@arichrisng.com, info@arichrisng.com, or call 07086458610 and speak to one of our infrastructure specialists.