Information Security Risk Assessment

The main steps of an Information Security Risk Assessment are:

  • Understanding the operations of your business
  • Identifying your information assets
  • Identifying the information handling processes in your  organisation
  • Identifying any vulnerabilities in your assets or processes
  • Identifying threats to your information assets
  • Identifying and analysing risks faced by your organisation
  • Recommending measures to reduce the likelihood and/or impact of these risks

Upon completion of the Information Security Risk Assessment, you will get an assessment report that includes:

  • Identified assets
  • Identified vulnerabilities
  • Identified threats
  • Identified risks
  • Recommended safeguards

An Information Security Risk Assessments should be carried out when a new organisation is started and whenever there is a change in the operating environment, such as when a new system is introduced.

At a minimum, an assessment or audit should be carried out at least annually.