April’s step in the NCSC resilience series — the part most organisations avoid until it’s too late.
Three months in — governance mapped, assets catalogued, threats understood. Now it’s time for the part most organisations skip until a breach forces the conversation: finding exactly where you’re exposed before an attacker does.
A vulnerability assessment maps your weaknesses across every domain — network, endpoints, cloud, identity, and third-party connections — before they become incidents. It is not a penetration test. A pen test exploits what it finds. An assessment finds it first. For most Irish businesses in 2026, assessment comes before pen testing.
of Irish organisations say third-party breaches are their #1 cyber threat — two years running.
PwC Digital Trust Insights 2026
of Irish firms invest significantly more in proactive security than reactive — vs 24% globally.
PwC Digital Trust Insights 2026
of Irish companies now run all core systems in the cloud, up from 15% in 2023 — misconfiguration is the #1 attack vector in that estate.
EY Ireland Tech Leaders Outlook 2025
What To Assess
The 5 IT Vulnerability Assessment Domains
-
01
Network & Infrastructure
Perimeter, firewalls, VPNs, routers, and cloud infrastructure. Misconfigured cloud environments are among the most exploited weaknesses in Irish organisations right now.
-
02
Endpoints & Devices
Laptops, BYOD, workstations. Windows 10 reached end-of-support in October 2025 — with ~40% of global devices still running it unpatched, this is a live exposure in most environments.
-
03
Web Applications & APIs
Customer portals, internal apps, and every API integration your business exposes. Injection attacks, broken authentication, and misconfiguration top OWASP’s list year after year.
-
04
Identity & Access — Highest Risk
Verizon DBIR 2025: credential abuse was the initial access vector in 22% of all breaches, and 88% of web application attacks used stolen credentials. Review your Active Directory, MFA coverage, and privileged accounts now.
-
05
Third-Party & Supply Chain
The NCSC 2025 National Cyber Risk Assessment explicitly flags Ireland’s exposure to “second-order consequences” from supply chain attacks. Every MSP, SaaS tool, and API with access to your data is part of your attack surface.
How To Do It
The 4-Phase Assessment Framework
Phase 1
Scope & Asset Discovery
Confirm your full asset inventory — including shadow IT, forgotten test servers, and cloud resources provisioned outside normal procurement. Undiscovered assets are a common finding in first-time assessments.
Phase 2
Authenticated Scanning
Run credentialled vulnerability scans across your in-scope estate. Authenticated scanning produces far more complete results than unauthenticated tooling — the difference is significant.
Phase 3
Manual Review & Validation
A qualified analyst eliminates false positives and identifies issues automated tools miss — logic flaws in applications and misconfigured access controls that don’t trigger automated alerts.
Phase 4
Risk-Based Prioritisation
Weight findings by exploitability, exposure, and business impact. CVSS scores alone are not enough context — a critical score on an isolated internal system may matter less than a medium score on your internet-facing payment portal.
Avoid These
5 Mistakes That Make Assessments Worthless
- Scanning without credentials — unauthenticated scans miss the majority of findings on internal systems.
- Treating it as a one-time event — environments change daily. Run assessments at minimum quarterly.
- Prioritising by CVSS score alone — severity in the abstract is not the same as risk in your specific environment.
- Stopping at the scan report — a vulnerability list with no owners and no remediation plan is an expensive document, not a security programme.
- Forgetting third parties — every MSP with admin access, every SaaS app storing your data, and every API integration is part of your attack surface.
NIS2 & Compliance
Ireland is subject to EC infringement proceedings for late NIS2 transposition as of early 2026. The National Cybersecurity Bill is still in the legislative process — but Article 21 of NIS2 already requires risk analysis and security policies. Waiting for the law to pass is not a strategy. The technical work needs to happen now.
Your April Checklist
By end of April, can you answer these?
- Complete, prioritised vulnerability list across our in-scope estate?
- Do we know which vulnerabilities are actively exploited in the wild right now?
- Findings mapped to our critical assets (Feb) and threat picture (Mar)?
- Remediation plan with owners, timelines, and verification steps?
- Recurring scanning schedule in place — not just a one-off?
- Visibility into third-party and supply chain exposure?
Coming in May
Strengthen Identity & Access Management
The identity gaps your April assessment uncovers feed directly into May’s work — MFA rollout, privileged access review, and directory hardening.
Verified Sources
- NCSC Ireland — 2025 National Cyber Risk Assessment
- PwC Ireland — Digital Trust Insights 2026
- EY Ireland — Tech Leaders Outlook 2025
- Verizon — Data Breach Investigations Report 2025
- NCSC UK — Cyber Assessment Framework v3.2
- William Fry — NIS2 Ireland Guidance 2025
- Matheson — NCRA SME Resilience Report 2025


