How does it work?
When considering your information security, you need to think about:
- Where is your data?
- How is it stored?
- Who has permission to access it?
- How is it accessed by your users?
- How else could it be accessed?
Data can be vulnerable in three key ways:
- Where it is stored
- When it is being transferred
- When it is held by a user
We will work with you to analyse the key risks for your data, and help you build a robust system and policy to mitigate those risks. We will advise you on appropriate tools for your business including two-factor authentication, encryption of information, creating virtual private networks for remote access, detecting intrusions to your network, and protecting your infrastructure from viruses and malware.
What does it cost?
Our initial consultation is costed on a project basis, while licensing, support and maintenance of any tools or platforms can be built into any managed services contract.