- IT Security and Risk Management
The IT Agency’s Security and Risk Management solutions will ensure your organisation’s network, data and physical devices are secure from external attack or intrusion. Business-critical and customer-related sensitive data is both secure and meets statutory data-security compliance obligations. Physical hardware, including mobile devices – e.g. laptops, tablets, mobile phones – are protected from unauthorised use and any company data stored on them is secured. Our comprehensive range of Security and Risk Management components include:
- Account Monitoring and Control
- Limitation and Control of Network Ports, Protocols, and Services
- Anti-virus
- Application Software Security
- Maintenance, Monitoring, and Analysis of Audit Logs
- Boundary Defence
- Business Continuity
- Malware Defences
- Continuous Vulnerability Assessment and Remediation
- Penetration Tests and ‘Red Team’ Exercises to ensure Security remains effective
- Controlled Access Based on the Need to Know
- Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
- Controlled Use of Administrative Privileges
- Data Protection
- Secure Configurations for Network Devices, e.g. Firewalls, Routers, and Switches
- Data Recovery Capability
- Firewall
- Secure Network Engineering
- Incident Response and Management
- Security Skills Assessment and subsequent appropriate training where required
- Intrusion Prevention and Intrusion Detection
- Updates and Patching
- Inventory of authorised and unauthorised Devices
- Wireless Access Control
- Inventory of authorised and unauthorised Software