That’s not unusual. That’s actually average.
When we ran the audit, we found the entry point in about two hours. An old admin account that belonged to someone who left the company in 2021. Still active. Still had full access. The Canadian Centre for Cyber Security lists access control review as a baseline security control for exactly this reason. The attacker didn’t need to be sophisticated. They just needed to try.
What a Cybersecurity Audit Actually Is
Let me be clear about something. A cybersecurity audit is not someone running a scan and handing you a PDF full of color-coded risk scores. That’s a vulnerability scan. It’s useful, but it’s not an audit.
A real audit looks at everything. Your security policies, your access controls, how data moves through your network, who has admin rights, what’s being logged, what isn’t being logged. It looks at the gap between what you think is happening and what’s actually happening.
That gap is where breaches live.
What We Actually Find When We Audit a Business for the First Time
I’ve been doing this long enough to see the same patterns. Here’s what shows up in almost every first-time audit we run:
Former employees still have access. This one is almost universal. People leave, but their accounts stay active. Sometimes for years. Every one of those accounts is a door that nobody’s watching. We’ve found accounts for employees who left five years ago with full admin rights still enabled.
Multi-factor authentication is partially deployed. MFA is turned on for email, maybe. But not for VPN. Not for cloud apps. Not for the admin console on the firewall. Partial MFA is like locking the front door but leaving the garage open. Attackers don’t try the locked door. They walk around to the one you forgot.
Nobody’s reviewing logs. Most businesses have logging turned on somewhere. Almost none of them are actually reviewing those logs. If a login happens from another country at 3 AM, who sees that? Usually nobody. Those logs are only useful if someone is actually reading them.
Backups exist but haven’t been tested. You have backups. Great. Have you ever actually tried to restore from them? When we test, about half the time something is broken. A backup you can’t restore from isn’t a backup. It’s a false sense of security.
Compliance is assumed, not verified. If your business handles any kind of personal or financial data, you’ve got compliance obligations. PIPEDA, industry regulations, client contracts with security clauses. Most businesses assume they’re compliant because they haven’t been told otherwise. That’s not how compliance works.
Shadow IT is everywhere. Employees using personal Dropbox accounts, unapproved messaging apps, personal devices connected to the network without anyone knowing. Each one is an unmanaged risk that your security policies don’t cover because nobody knows it exists.
Why Most Businesses Skip Audits
I get it. Nobody wakes up excited about a cybersecurity audit. It feels like a cost with no visible return. Everything’s working fine, so why poke at it?
Here’s the problem with that logic. “Everything’s working fine” is what every breached company said the week before the breach. The absence of visible problems is not the same as the presence of security.
The other reason businesses skip audits is fear. Nobody wants to find out their systems are a mess. But finding out from an auditor is infinitely better than finding out from a ransomware note.
And there’s a third reason: cost. Business owners assume an audit is going to be expensive and disruptive. In reality, a well-planned audit can be completed with minimal disruption to your operations. We work around your schedule, not the other way around. And the cost of not auditing is almost always higher than the cost of doing it right.
What a Good Audit Looks Like
A proper cybersecurity audit follows a structured process:
Risk assessment comes first. What are the actual threats facing your specific business? A law firm has different risks than a logistics company. A healthcare provider has different compliance requirements than a retail chain. The audit should be tailored to your industry, your data, and your operations.
Then comes the technical review. Firewalls, endpoints, access controls, encryption, patch levels, network segmentation. Every system gets examined. We’re looking for the gaps that automated scans miss, the misconfigurations that create openings, and the outdated systems that should have been replaced years ago.
Policy and process review. Do you have an incident response plan? Is it written down? Has your team practiced it? Are your security policies actually being followed, or are they sitting in a binder nobody’s opened since onboarding?
Compliance mapping. We check your current posture against the frameworks and regulations that apply to you. Not theoretical compliance. Actual, demonstrable compliance with documentation to back it up.
Then you get a report that makes sense. Not 200 pages of technical jargon. A clear breakdown of what’s working, what’s not, and what to fix first. Prioritized by actual risk, not by what looks scariest on a chart.
How Often Should You Audit?
At minimum, once a year. But that’s the floor, not the ceiling.
If you’ve had a major change, like a merger, a new office, a migration to the cloud, or a significant staff turnover, you should audit again. The environment changed. Your security posture needs to be re-evaluated.
Regulated industries often have specific audit requirements. If you’re in healthcare, finance, or legal services, your compliance framework may dictate how often audits must occur. Don’t guess on this. Know your obligations.
Think of it like a financial audit. You wouldn’t go years without reviewing your books. Your IT security deserves the same discipline.
Why You Want an Outside Set of Eyes
Internal IT teams are great at keeping things running. But asking them to audit their own work creates a blind spot. It’s not about trust. It’s about perspective. An external auditor brings fresh eyes, different experience, and no attachment to how things have always been done.
At Keeran Networks, we’ve run hundreds of audits across industries throughout Canada. We know where to look because we’ve seen what goes wrong. We also know how to turn findings into a practical action plan. Not just a list of problems, but a prioritized roadmap for actually fixing them.
You don’t need to be perfect. You need to know where you stand and have a plan to get better. That’s what a good audit gives you.
Book a Free Consultation
Frequently Asked Questions
How often should a business get a cybersecurity audit?
At minimum, annually. Businesses in regulated industries (finance, healthcare, legal) or those handling sensitive client data should audit quarterly. The threat landscape changes fast enough that an audit from 18 months ago may be completely outdated.
What does a cybersecurity audit include?
A real audit examines your access controls, password policies, endpoint protection, network segmentation, backup and recovery procedures, employee training, and compliance posture. It’s not just a vulnerability scan — it’s a comprehensive review of your security practices, technology, and processes.
How much does a cybersecurity audit cost for a small business?
A thorough audit for a business with 10–50 employees typically costs between $3,000 and $10,000, depending on scope and complexity. Compare this to the average breach cost of $150,000+ and the investment becomes clear.
Can we do a cybersecurity audit ourselves?
You can run internal checks, but an outside auditor catches blind spots your team has normalized. The value of an external audit is objectivity — someone who doesn’t know your workarounds and assumptions, and who will flag what your team has learned to live with.
Related: Learn more about how to prevent data breaches, what to include in your incident response protocol, and why MFA is important.