This assessment aids the buyer of a business by identifying shortcomings which could, post-sale, result in costly cybersecurity incidents and/or business disruptions.
The seller answers a collection of questions; providing an understanding of the business and its reliance on IT infrastructure. Optionally, the buyer may express specific concerns and their future vision for the acquired business. This information is analyzed and a report provided to the buyer. The report identifies:
Exemplary cybersecurity practices.
Shortcomings in the business’ cybersecurity practices and their potential negative impact on business operations.
A prioritized set of actions which may be undertaken to improve the business’ cybersecurity and resilience practices.