DMA risk assessments can be applied to a specific application, device, physical security measures and or entire network and all devices attached to it. The process is to identify all assets on the network, people, process and technology, then using appropriate standards, or your current risk rating process, assess risks, identify and document all components, and assess their vulnerability.
The detailed report goes further to recommend appropriate causes of action required to mitigate risk. This may take various forms and is best discussed in a telephone call or meeting.
Please email info@dmaust.com.au to arrange a confidential discussion on your requirements