Information Security and Governance
1

We provide specialized expertise in information security, and we answer your “how” questions e.g., how to protect data and private information, how to control access to data and information, how to manage physical data backup and assets, how to ensure staff awareness of security risks, how to have good security housekeeping, etc. We perform IT security review and process audits, penetration and vulnerability testing. We conduct information security awareness seminars and trainings. We undertake risk assessments and prepare an action plan to address vulnerabilities. We perform IT security model implementation, including drafting of information security policies and IT control policies. We provide expert advice and training on penetration testing and network hacking and defense.