Our team are experienced in managed services, change management and delivery of IT projects.
Our team have a track record across many years, industries and operating models. We specifically have a depth of experience of working within regulatory environments.
Information Security has changed – from building impregnable firewalls, to an understanding that threats can not only penetrate perimeter defenses but also originate from within organisations.
We work with our clients to help plan for the future. What areas should be invested in, how to get better value for money or what technologies to look towards for the future.
Action Item Checklist Function Summary Description User Name and Password Protection Strictly enforce robust password security as per NIST Standards that include Upper and lower case letters, numbers and symbols Minimum of 8 characters, avoiding common words and dates Password not used for any other log in’s Changing passwords regularly – 3 months Using 2 […]
We are currently working with two large companies and it is interesting on my behalf on how little emphasis there has been on asset registers. An asset register of IT equipment is one of the foundations of your IT systems and security, if you dont know what you own, then you dont know what keys […]
Much of the business discussion around cybersecurity relates to protection of key assets such as customer information and intellectual property, often after the news that another company has suffered a large data breach. While strengthening defenses against cyber attackers is important, companies also must be prepared to handle the reputational and financial hits that a […]
Cybersecurity/ IT Risk Management is (or should be) on the agenda of boards. Information Technology is ranked by many as a top 10 risk, but does your board treat it accordingly? Working on and with Boards of Directors, I understand that the agenda is pretty full on, despite Zoom decreasing the actual meeting times. Since […]