Security Management & Auditing
Digital Innovations is an END TO END security solutions provider for your infrastructure and information. We offer tailored solutions based on YOUR business model.
It does not matter if you run a home business or head up a 1000 employee, multi-site organisation. Digital Innovations can help find the holes in your security and fix them. We can also set up a comprehensive information redundancy process to keep your data safe and keep you sleeping peacefully at night.
Infrastructure & Information Security Auditing
This process can be broken down into 6 basic steps:
-
PRIMARY MEETING
This is where we meet with your business and get a better understanding of your organisation's structure, business plan and requirements.
-
NO OBLIGATION SITE VISIT
Our team then makes a site visit to get more information on your current infrastructure.
-
QUOTE & CARRY OUT AUDIT
We will come back to you with a quote and then carry out the audit, if you are happy for us to proceed.
-
REPORT, RECOMMENDATIONS & QUOTE TO IMPLEMENT
After our audit, we give you a report and a comprehensive set of recommendations. We will also give you a quote to implement those recommendations.
-
IMPLEMENT & INDUCTION PROGRAM
We implement all the recommendations. We then organise an induction program for you and your staff to introduce you to the updates system and train you on the new policies and access control.
-
POST-IMPLEMENTATION CHECKS AND REVISIONS
We will then schedule bi-annual check ups to make sure that all the security and redundancy is still as robust as when we commissioned it. We also make revisions to security policies and redundancy processes based on how your business has evolved.
What areas of security and redundancy do we specialise in?
Our areas of expertise can be broadly classified into the following modules:
- Anti Virus, Anti-Spyware & Firewalls
- Password Policy & Documentation Protection
- Business Contingency Planning
- Data sensitivity level categorising
- Standards, guideline & Procedures
- Permit or deny resources
- Stop attacks & Unauthorised entry
- Physical access control and intrusion detection