top of page

SERVICES

CISOV_edited.jpg

VIRTUAL CISO

A Virtual Chief Information Security Officer (vCISO) helps organisations to protect their infrastructure, data, people and customers. 

​

  • Identify security risks and create suitable controls 

  • Develop policies that encourage secure working        

  • Build understanding and awareness of security issues

  • Develop operating processes

  • Track and report on info security projects

  • Develop training for employees, explaining risks and demonstrating good practices    

  • Providing exco-level reporting and feedback

Testpen_edited.jpg

PENETRATION TEST

A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities.

VULNERABILITY ASSESSMENT

A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.

CSALogo.png

COMPREHENSIVE SECURITY ASSESSMENT

Security assessments are valuable tools which offer an independent view on the readiness of an organisation to cope with cybersecurity threats in various areas of their business. 

  • Security Maturity Assessment

    • Policies

    • Leadership

    • Education

    • Accounts & Passwords

    • Software & Hardware

    • Business Continuity 

  • Technical Controls Assessment

    • Endpoint Security

    • Network Security

    • Active Directory

    • Microsoft 365

  • External Reconnaissance & Vulnerability Assessment

    • Internet-facing Servers

    • SSL Certificates

    • Email Security

  • Reporting & Recommendations Workshop

Vconsult_edited.jpg

CONSULTING & 
MANAGED SERVICES

Consultative services including monthly managed service agreements, including but not limited to the below: 

  • Endpoint and Firewall Management

    • Case ticketing and call handling 

    • Call handling and escalation for complex issues

    • Incident response, fault isolation and (remote) remediation support

    • Weekly or Monthly reporting of deployment stats and reported incidents. 

    • Annual heath check report with the vendor

  • Consultative hours available on a month-to-month basis covering areas like​

    • Cyber security strategy alignment to business objectives

    • Best-practice cybersecurity development

    • Compliance assistance including but not limited to GDPR, POPI, PCI-DSS and ISO

    • Cyber security policy development and implementation

bottom of page