Network Security

The threat to government networks is HERE, NOW and GETTING BIGGER....  The worst fallout from a cyberattack can be what it leaves behind, such as malicious software that can be activated later. That, compounded with ongoing efforts by hackers to infect as many machines as possible using bogus email offers and harmful website code can leave a lot of "zombified" machines. Those machines can then be made into cyber weapons, which can overload a network, website or other machine with a deluge of data known as a DDoS, or distributed denial of service attack. Of course, the reported attacks are only the tip of the iceberg and it is estimated that in the U.S. alone, the number of compromised computers runs into millions. In 2012, 17% of cyber attacks were against governments.

Our data security team can ensure that any holes in your network defences are plugged and your data is secure.

Close the Gap in your IT Security....   Our services are focused on helping organisations defend and assess themselves against the next generation of security threats and educating companies on the risk they are exposed to. We work with leading IT security vendors and consultancies to close the gap in your own IT security strategy and to assist in streamlining and prioritising your spending, assessments and compliance requirements.

Gain a Competitive Edge....  Compliance with external standards such as PCI and ISO 27001 is a top priority for many organizations. For some it is driven by the requirement to conform to industry or legislative regulations and is effectively a license to trade. For others it provides demonstrable assurance of information and data handling processes to gain significant competitive advantage in the marketplace.

ISO 27001 - Serious about Network Security....  Becoming certified to the ISO 27001 standard demonstrates to customers, auditors and other third parties that you are serious about managing information security. Whether you are using the standard as a guideline, working towards certification or already certified we can provide expert assistance in a number of ways.

Gap Analysis....  Compare and document you current management system with the requirements of the standard.

Risk Assessment....  Taking a pragmatic approach to assessing the risks to your key information assets.

Developing Policies and Procedures....  Practical and brief enough to be useable but robust enough to allow you to effectively control data and information security.

Internal Audit....  Aimed mainly at organisations that are already certified and need assistance with the internal audit workload or would benefit from a fresh pair of eyes.

Certification Preparation....  Providing experience to help you through the certification project and final audit.

Management review....  Review of internal and external audit, incident records and updated risk assessment to help you ensure continual improvement of your ISMS.

PCI DSS....  The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements developed to reduce credit card fraud and increase data security. This industry standard affects every company that deals with (stores, processes of transmits) card payment transactions. The PCI DSS requires companies to:

  • Protect Cardholder Data
  • Maintain a Vulnerability Management Program
  • Implement Strong Access Control Measures
  • Regularly Monitor and Test Networks
  • Maintain an Information Security Policy