An IT Health Check (ITHC) is used to confirm that your information systems and network meet a specified baseline standard. Also known as Codes of Connection (CoCo), these rules are used by organisations like the NHS and the Gambling Commission to ensure only trusted partners are able to exchange data online.
The ITHC provides assurance to your partners that internal and external systems are protected from unauthorised access. This includes wireless access points which connect to the internal network and remote working devices, such as company smartphones. You will need to complete an ITHC once per year – or risk losing access to these trusted resources, such as the NHS Public Service Network (PSN).
Your partners operate a CoCo
If your partner applies a Codes of Connection (CoCo), you have no choice – an annual IT health check is a non-negotiable requirement of doing business with them.
You plan to connect to the NHS PSN
If you plan to supply goods or services to the NHS, you will need to ‘earn’ a Public Service Network (PSN) certificate. To do that your IT security systems will need to pass a penetration test carried out according to a specific government standard.
You must renew your PSN certificate
The PSN certificate that grants access to NHS digital resources must be renewed once a year. If your certificate expiry date is approaching, you will need to arrange for a fresh IT health check.
External security scan
The ITHC assesses security provisions at all levels of your network, starting with external facing assets. Our consultants check VPNs, email portals and websites meet the specified government standards.
Internal security scan
Shifting attention to your internal network, consultants will then test at least 10% of your servers and PCs for vulnerabilities that could be exploited. We will also check wireless network configuration to ensure it has been properly secured.
Engineers will ‘attack’ the firewall between your network and the PSN to confirm resilience and integrity. We will also review the rules and configurations of your main firewall to ensure all-round network security.
Device configuration review
To limit potential attack surfaces our consultants will audit desktop and server builds, checking for vulnerabilities. We will also assess your mobile device management (MDM) systems to confirm that smartphones, tablets and laptops are secured in accordance with the relevant CoCo requirements.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
“Becoming CREST certified shows Fidus’ commitment to ensuring we maintain the highest standards of policies and procedures within our company.” Fidus Information Security have gained CREST accreditation for penetration testing services. We are extremely proud to announce that we are now a Council for Registered Ethical Security Testers (CREST) accredited company for penetration testing services. […]
Exploiting the eRosary Application In this post we’re going to cover a trivial full account takeover vulnerability our team identified within the new eRosary application, whilst placing an order for the watch! The ClickToPray eRosary beads are advertised as ‘an interactive, smart and app-driven device that serves as a tool for learning how to pray […]