IT Security and Risk Management

The IT Agency’s Security and Risk Management solutions will ensure your organisation’s network, data and physical devices are secure from external attack or intrusion. Business-critical and customer-related sensitive data is both secure and meets statutory data-security compliance obligations. Physical hardware, including mobile devices – e.g. laptops, tablets, mobile phones – are protected from unauthorised use and any company data stored on them is secured. Our comprehensive range of Security and Risk Management components include:

  • Account Monitoring and Control
  • Limitation and Control of Network Ports, Protocols, and Services
  • Anti-virus
  • Application Software Security
  • Maintenance, Monitoring, and Analysis of Audit Logs
  • Boundary Defence
  • Business Continuity
  • Malware Defences
  • Continuous Vulnerability Assessment and Remediation
  • Penetration Tests and ‘Red Team’ Exercises to ensure Security remains effective
  • Controlled Access Based on the Need to Know
  • Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
  • Controlled Use of Administrative Privileges
  • Data Protection
  • Secure Configurations for Network Devices, e.g. Firewalls, Routers, and Switches
  • Data Recovery Capability
  • Firewall
  • Secure Network Engineering
  • Incident Response and Management
  • Security Skills Assessment and subsequent appropriate training where required
  • Intrusion Prevention and Intrusion Detection
  • Updates and Patching
  • Inventory of authorised and unauthorised Devices
  • Wireless Access Control
  • Inventory of authorised and unauthorised Software

48 Point System Health Check