Security Assessment Request

Determine Your Security Posture

Request a Security Risk Assessment

Your organisation’s security posture reflects its ability to detect, respond to, and recover from cyber threats — both internal and external. This form enables IT Trust to evaluate your infrastructure and identify vulnerabilities that could impact your business, your customers, and your reputation.

A Security Risk Assessment helps uncover weaknesses across your digital environment — including employee access, backend systems, public-facing assets, and web applications. Based on your responses, IT Trust will analyse your environment and offer expert guidance on improving your resilience against cyber threats.

We follow a practical, business-focused process that includes:

  • A structured assessment based on your inputs

  • Expert review by our security specialists

  • Actionable feedback and prioritised recommendations within 5–7 working days

Form Structure and Instructions

This form is divided into four sections:

  1. Company Information (Required)

  2. Internal Assessment – Systems your team uses (e.g. servers, routers, Microsoft 365)

  3. External Assessment – Systems the public interacts with (e.g. your website)

  4. Web Application Assessment – Apps the public uses (e.g. e-commerce, customer portals)

Only complete the sections relevant to your organisation. You may skip non-applicable sections using the Next button at the bottom of the page.

Company Information


Internal Assessment

This refers to the infrastructure employees, contractors, sub-contractors are interacting with, (ie. any server - hosted or on-prem, a switch, a router, Microsoft 365)

External Assessment

This is the frontend infrastructure that the general public interacts with. (ie. the company's website)

Web Application Assessment

This can be any application provided to the public by the company. (ie. An e-commerce store, parcel tracking system - generally any app used by the public which will require a database on the backend)