OUR SERVICES
Information Security and Data Privacy Audit, Tests and Assessments
Information Security and Data Privacy Tests, Audits and Assessments (following COBIT5, ISO27000, Data Privacy, PCI-DSS, HIPAA, SOX, SoGP, NIST and OWASP standards), data privacy , pre-compliance and compliance audits and business process audits.
Disaster Recovery and Business Continuity Planning
According to a Gartner Study: Two out of five companies that were hit by a disaster are unable to recover. Of the two who survived, one will go out of business within the next two years. A Business Continuity Plan (BCP) has processes and procedures that should be done by the entire organization.
Vulnerability Assessment and Penetration Tests
Vulnerability assessment is an evaluation method that enables organizations to review their systems for potential security weaknesses.
It performs a vulnerability analysis process that aims to discover whether the organization is at risk of known vulnerabilities, assigns a level of severity to those vulnerabilities, and recommends whether a threat should be mitigated or remediated.
Vulnerability testing helps organizations discover whether their systems and software have active default settings that are insecure,
which can include easily guessable admin passwords. It also assesses vulnerability to code injection attacks, such as Structured Query Language injection (SQLi) and cross-site scripting (XSS) attacks, and checks for a potential escalation of user privileges or incorrect authentication mechanisms.
Vulnerability assessment can cover any or all of the following items: networks, host-based applications and servers, cloud infrastructure, wireless networks, applications and
databases.
Penetration tests, also known as pentests, is a simulated cyberattack against a computer system, an application or an infrastructure to check for exploitable vulnerabilities.