Security Risk Assessment

Find your IT security gaps
before the bad guys do


Be Compliant, Satisfy Your Insurance, and Get Peace of Mind

Measuring your healthcare practice security posture against the NIST Cybersecurity Framework gives you and your IT provider the insight and guidance needed to ensure you’re doing everything you can to keep patient and practice data safe. Additionally it helps you comply with privacy laws and college guidelines, and satisfy insurance requirements.

The Alexio Inspector risk assessment includes:

Discovery & Inventory of Hardware & Software Assets

Vulnerability Scanning

Interviews with Management

Policy & Procedure Review

Security Controls Audit

Backup & Disaster Recovery Assessment

Documentation of Findings & Recommendations

Debriefing with a Certified Cybersecurity Professional

Who Needs a Risk Assessment?

Alexio™ Inspector was specifically designed for healthcare practices to find IT security gaps and vulnernabilities and provide recommendations on how to fix them. Even if you have an IT company currently monitoring your network, our 3rd party assessment will allow you to see how well they’ve protected you and identify blind-spots. 

An annual security risk assessment is the best way to keep data safe from ransomware, hacking, data theft, and employee mistakes. 

We perform professional IT security risk assessments for physicians, dentists, chiropractors, physiotherapists, psychologists, psychiatrists, and many other healthcare practices.

There's Always Blind Spots. We Find Them.

Find the gaps in your network

Alexio inspector always finds security gaps, and that's the point. Find and fix the gaps before you become a victim.

Proof of Compliance - Privacy Laws

Many provinces call for annual risk assessements, especially in healthcare, or as part of a PIA (Privacy Impact Assessment)

Find out if you've been hacked

Get a full report of your hardware, software, backup, and network status. Plus, you'll get a risk management plan consultation with a Certified Cybersecurity Professional.

“if you spend more on coffee than IT security, you will be hacked. What's more, you deserve to be hacked.”

Richard Clarke – Whitehouse Cybersecurity Advisor

What's Included in Your Security Risk Assessment?

Some don't even know they've been hacked...

This year, 40% of small to medium sized businesses that manage their own network will have their network accessed by a hacker, and more than 50% won’t even know they were attacked. (Source: Gartner Group)

97% of the small business and healthcare practices where we perform risk assessments fail. This is alarming considering the number of business owners who ‘thought their IT had it covered’

Book a chat today to see how Alexio Inspector Risk Assessment can help give you peace of mind. 

Get Canada's Experts on your side

We’re Canada’s award-winning team of privacy & cybersecurity professionals specializing in  healthcare practices. Book a chat today to see how we can help you.

What is a Security Risk Assessment? FAQ

A security risk assessment is a tool that allows you to find out where your systems (and people) are creating a technology risk for your practice.

Who performs the Security Risk Assessment?

All our security risks assessments are performed – and debriefing done – by a Certified Information Security Manager (CISM). CISM is an advanced certification which indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program. It is the global standard for professionals involved in information security, assurance, risk management, and governance, and it requires a minimum of 5 years cybersecurity experience to attain. The certification is validated and maintained by the individual obtaining ongoing CPE credits.

How is the Security Risk Assessment Conducted?

Using our third-party software-based assessment, you will be provided with a deep-dive, unbiased report of the important parameters of all your computer systems and network.

Our assessment probes hundreds of parameters within your systems & network and produces an easy-to-understand comprehensive report on potential threats to your system, including recommendations for fixing them.

One of our CISMs will book a 60-90 minute appointment with you to install the risk assessment software. During this meeting, you will discuss various issues and gather data to help create your executive summary and final reports. The software will collect data for up to 7 days, and then we will create our final reports. We will need about 1 hour with the stakeholder(s) to do a debrief of our findings. Your final reports will be an important piece of your privacy compliance documentation.

What do I do with the reports and findings?

You are then able to share this information with your IT company to have them close the gaps and vulnerabilities in your systems help bulletproof your data. A third-party assessment is the only way to ensure that ‘blind-spots’ are corrected. It is not good enough to simply have people evaluate their own work.

Can I get help to fix the problems if I need it?

Many small businesses struggle to find a suitable IT provider with the certifications, skills, and experience to support their small business. That’s why Alexio also has an IT division. Whether you want to handle day-to-day issues yourself with our support, or you want a managed IT service, we’ve got you covered.



Get Started Today!

Scroll to Top