IT Solutions/IT Security
Our partner, ICTS CONSULTANTS, provides IT solutions ranging from hardware and software products supply and support, network design, installation and support, software development, database support, and designing IT policies, standards and procedures for organisations. Our speciality is IT security. ICTS Consultants will assess your risks, help you to reduce risk and protect your valuable assets. We help you improve your understanding of the role of cyber-security and provide actionable guidance to protect your business. IT security management entails the identification of an organisation’s information assets, the development, documentation and implementation of policies, standards, procedures and guidelines. Management tools such as data classification, security awareness training, risk assessment and risk analysis are used to identify the threats, classify assets, and rate their vulnerabilities so that effective security controls can be implemented.
Our IT security services include:
Governance Risk & Compliance
We assess your current security position while aligning approaches with your specific regulatory requirements. With a robust framework, you will improve your organisation’s decision making, as well as its ability to achieve compliance and to prepare for market volatility.
Business Continuity & Cyber Resilience
As you ready your business for a significant disruption, you’ll need cyber and traditional continuity and recovery strategies that involve personnel across all levels of your business. With integrated response plans, we help you align your business continuity programmes with your organizational structure to build business resilience.
Do you want a different type of audit? A technical investigative as opposed to normal checklist-based audit? We have qualified staff who will check for the existence of controls, and will verify that the controls work as expected by testing them thoroughly.
Incidence Response & Disaster Recovery
Have you encountered an incident? Have you experienced a virus or worm attack? Have your systems - Linux, AIX, Windows, Firewalls, Network devices, Virtual services, etc - failed? Have you lost configurations? Our team will help you restore your critical services.
Do you have a Disaster Recovery Plan? Has it been tested? We can perform an independent test and give you the assurance that you need.
Have you been hacked? Do you want to find out who breached your systems? Our team will help you investigate breaches and abuses to your system up to providing evidence for legal or disciplinary action. We can also help you recover your data.