02  /  Business Audit

Know Your Gaps
Before They Do.

A comprehensive security assessment for small and medium businesses across British Columbia and Canada. We expose the gaps that attackers find – and give you a clear, actionable plan to close them.

Four Areas.
No Blind Spots.

A business audit covers every layer where attackers look for a way in – from your network perimeter to how your staff handles sensitive information.

01

Network & Infrastructure Review

We map your network, identify exposed services, misconfigured devices, and unpatched systems that give attackers a foothold. Routers, firewalls, servers, and cloud assets all come into scope.

02

Phishing Vulnerability Test

Controlled phishing simulations test how staff respond to social engineering attempts. Results aren’t about blame – they show where targeted training will reduce the most risk.

03

Staff Security Posture

Interviews and brief assessments reveal how your team actually handles credentials, devices, remote access, and sensitive information – not just how they’re supposed to. Most breaches start here.

04

Data Handling Assessment

We assess how your business collects, stores, and protects sensitive data – including client records, payment information, and anything covered by PIPEDA or provincial privacy law. Gaps here create both security risk and regulatory exposure.

Built for
Your Scale.

Business audits are designed for organizations that handle sensitive client data or operate in sectors where a breach would be costly – financially or reputationally.

Primary Fit

Small to Medium Businesses

5 to 200 employees. Often no dedicated security staff. Enough complexity to have real risk, enough simplicity to address it properly. This is exactly the gap an audit closes.

Regulated Industries

Healthcare & Legal

If you handle medical records or privileged client information, you have obligations under privacy law. We help you understand and close the gap between obligation and practice.

Client-Data Businesses

Professional Services & Retail

Accountants, consultants, real estate offices, and retailers all hold information that has value to attackers. You don’t have to be large to be a target.

2 to 4 Weeks.
First Call to Final Report.

The timeline scales with your organization’s size and complexity. Most small businesses complete within two weeks. Mid-sized organizations typically run three to four.

Week 1
Discovery & Scoping Kickoff call, asset inventory, network diagram review, and scope agreement. We establish what’s in scope, who to talk to, and what we’re protecting.
Weeks 1-2
Technical Assessment Network and infrastructure scan, firewall and device configuration review, phishing simulation deployment, and cloud or remote access analysis.
Weeks 2-3
Staff & Process Review Staff security posture interviews, credential and access hygiene check, data handling walkthrough, and review of existing policies or procedures.
Weeks 3-4
Analysis & Reporting Vulnerability ranking by risk severity, executive summary and technical report preparation, and a findings briefing with your leadership team.

A Report You Can
Actually Act On.

Most security reports are written for auditors. This one is written for the person who has to fix things and the person who has to fund them.

Executive Summary

For Decision-Makers

Plain-language summary of what we found, what it means for your business, and what needs to happen first. Designed to be read in 10 minutes and understood without a technical background.

  • Top 3 risks requiring immediate action
  • Overall security posture rating
  • Estimated remediation effort and cost range
  • Canadian compliance posture (PIPEDA, provincial)
Technical Report

For Your Team

Full technical detail for your IT team or managed service provider – every vulnerability documented, ranked by severity, with remediation steps written for the person doing the fixing.

  • Complete vulnerability register with severity ratings
  • Step-by-step remediation guidance per finding
  • Evidence and methodology documentation
  • Findings briefing with your leadership team

Built on Intelligence
Tradecraft.

Methodology
Every assessment starts from the attacker’s perspective. Not a checklist. Not a tool scan that generates a 200-page report you can’t use. We look at what would actually be exploited, by whom, and how – then rank what to fix by real-world risk, not theoretical severity scores.
Nick Holyome – CISSP, CMMC RP – Principal, BHCS
Canadian Context
Every finding is evaluated against Canadian compliance obligations – PIPEDA, provincial privacy legislation, and where applicable, sector-specific requirements for healthcare, legal, and financial services. You get findings you can act on, not just a list of what was found.
Bolt Hold Cyber Security – Comox Valley, BC
Certifications
CISSP certification requires demonstrated mastery of eight security domains. CMMC RP accreditation covers the defence supply chain compliance framework. Both inform how audits are scoped, conducted, and reported – you get a practitioner, not a generalist.
Certified Information Systems Security Professional – ISC2

Ready to See Your Risk?

Book a discovery call. We’ll scope the audit to your organization and give you a clear timeline and cost estimate before any work begins.