Cybersecurity Assessment | Smartt | Digital, Managed IT and Cloud Provider

Cybersecurity Assessment

Cybersecurity Assessment

Review and mend security holes before someone else finds them.

Cybersecurity is a vital part of your organization in today's digital world. 

Smartt providers Cybersecurity Assessments utilizing the NIST (National Institute of Standards and Technology) Cybersecurity Framework. It's the perfect solution if you would like to: 

  • Prepare for compliance validation (Example: PCI, SOX, DISMA, HIPPA) or remove the potential of future compliance breaches
  • Validate IT or vendor work
  • Prepare for growth or expansion

Get a Free Proposal

Service Category

Why the Smartt Cybersecurity Assessment?

Clients typically use Smartt's Cybersecurity Assessment to assess its IT Service Management (ITSM) Practices, the effectiveness of their cybersecurity risk management efforts, and opportunities for improvements in the context of their overall organizational performance.  

Common Use Cases for Cybersecurity Assessments:

  • Compliance Preparation Prepare for compliance validation (Example: PCI, SOX, DISMA, HIPPA) or prevent potential future compliance breaches

  • Validating Current or Previous Work Validate work performed by an IT Vendor or a siloed IT group

  • Security Incident Recovery To have an objective post mortem and remediation plan after a significant service interruption or security incident

  • Growth or Expansion To assess on the existing environment to determine the best course of action (replication, scaling, re-design, or migration) for rapid growth and expansion

This assessment is built around the National Institute of Standards and Technology (NIST) Cybersecurity Framework – a globally adopted standard that is followed by many public and private companies. NIST is a U.S. agency dedicated to promoting industrial competitiveness by providing standards, guidelines, and practices that cover many fields. One of these fields is organizational cybersecurity, and NIST is considered one of the top authorities in the world in regard to developing up-to-date guidelines for companies to follow.

Get a Free Proposal

What are the benefits?

Protect your organization against rising cybercrimes.
Prevent financial impacts and liabilities from cyber attack events.

trophy icon

Identify gaps in your organization's current security posture by leveraging trustworthy third party expertise.


Determine what best practice implementations are required.


Identify the cost and timeline of improvements.

What are the Activities and Deliverables
From a Cybersecurity Assessment?

Our team will work with you to review the various aspects of your environment (physical, virtual, personnel, and procedural). 

  1. Kickoff Meeting
  2. Client Business Interviews
  3. Client Completed Pre-Assessment Questionaire
  4. Client-Reporting or Smartt Driven Manual Audit
  5. Technical Interviews
  6. Process Reviews
  7. Hardware Reviews
  8. Virtualization / OS Reviews
  9. Application Reviews
  10. Documentation & Evidence Review
  11. Validation As Needed (PEN Test / Vulnerability Scan. $500 for each instance. Identified and recommend on or before Documentation Review)
  12. Presentation & Q/A Session
  1. Audit Report
  2. Recommendations
  3. Fixed Fee Price
  4. Project Plan
  5. Timeline
People LOVE
Smartt's Security Offerings

They are amazing to work with. Staff are professional and knowledgable. It was great to work with them! Highly recommended!They are amazing to work with. Staff are professional and knowledgable. It was great to work with them! Highly recommended 

- Kenneth Cheung, Information Technology -

Get a Free Proposal

How Does a Cybersecurity Assessment Work?

A Cybersecurity Assessment can take from one to six  weeks. Based on the NIST (National Institute of Standards and Technology) Cybersecurity Framework, the assessment will review all aspects of your environment (Physical, virtual, personnel, and procedural) to make sure that any holes are discovered, known about, and taken care of before someone else finds them.

The Physical

A review of the "physical" environment based on the established boundaries of the assessment.  

  1. Servers
  2. Workstations
  3. Physical Locations
  4. Network Devices
The Virtual

An analysis of your network, with active scanning and penetration tests.

  1. Network Diagrams (Subnets and VLANS)
  2. Internal and Public IP ranges
  3. Vulnerability Scanning
  4. Penetration Testing
The Personnel

Pre-engagement questionnaire, interviews, and "shoulder surfing".

  1. Executive and Team Interviews
  2. Admins Questionnaire
  3. Operators Questionnaire Who are You?
  4. Security Personnel Questionnaire
  5. Shoulder Surfing
The Procedural

Review of current security controls against frameworks to identify gaps. 

  1. Evidence Requesting and Analysis
  2. Current Security Controls
  3. Review Against Frameworks 

Need Help?

If you’re wondering whether your brand needs refreshing, stop wondering and talk to us about the Smartt Brand Strategy Roadmap. We’re happy to give you a free consultation and show you examples.

Get a Free Proposal

Head Office

#113-3855 Henning Drive
BC V5C 6N3 Canada


Toll Free
in North America: 1-888-407-6937
Tel: 604.473.9700
Fax: 604.473.9080


# Social media

Get a free proposal