- TECHNICAL AUDITS
Background Checks, Reputational Restoration, Social Engineering Test by highly qualified personnel, to obtain sensitive information, credentials, unlawful creation of users, etc..
- Search of public records
- Forums and Social Networking
- User Support Center
- Spear Phishing
- Using decoy devices infected with malicious code
- Training sessions and awareness at all levels
Supported by the standard TIA-942:2005 and ISO 27002, as well as the current adjustment we will audit:
- Intruder alarm systems
- Unauthorized physical connection to the networks
- Recording and Monitoring Systems
- Electrical, SAIS and Generators
- Environmental Control
- Energy Efficiency
Our services are designed to ensure compliance with legislation, regulations and applicable security standards.
- Preparation of the regulatory body of information security.
- Defining an Awareness Plan.
- Risk analysis.
- Computer Contingency Plan.
- Business Continuity Plan.
- Comprehensive Security Plan.