
- Account Monitoring and Control
- Limitation and Control of Network Ports, Protocols, and Services
- Anti-virus
- Application Software Security
- Maintenance, Monitoring, and Analysis of Audit Logs
- Boundary Defence
- Business Continuity
- Malware Defences
- Continuous Vulnerability Assessment and Remediation
- Penetration Tests and 'Red Team' Exercises to ensure Security remains effective
- Controlled Access Based on the Need to Know
- Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
- Controlled Use of Administrative Privileges
- Data Protection
- Secure Configurations for Network Devices, e.g. Firewalls, Routers, and Switches
- Data Recovery Capability
- Firewall
- Secure Network Engineering
- Incident Response and Management
- Security Skills Assessment and subsequent appropriate training where required
- Intrusion Prevention and Intrusion Detection
- Updates and Patching
- Inventory of authorised and unauthorised Devices
- Wireless Access Control
- Inventory of authorised and unauthorised Software
Contact The IT Agency for further details on this, or any other, service.