Security Management & Auditing

Digital Innovations is an END TO END security solutions provider for your infrastructure and information. We offer tailored solutions based on YOUR business model.

It does not matter if you run a home business or head up a 1000 employee, multi-site organisation. Digital Innovations can help find the holes in your security and fix them. We can also set up a comprehensive information redundancy process to keep your data safe and keep you sleeping peacefully at night.

Infrastructure & Information Security Auditing

This process can be broken down into 6 basic steps:

  1. PRIMARY MEETING

    This is where we meet with your business and get a better understanding of your organisation's structure, business plan and requirements.

  2. NO OBLIGATION SITE VISIT

    Our team then makes a site visit to get more information on your current infrastructure.

  3. QUOTE & CARRY OUT AUDIT

    We will come back to you with a quote and then carry out the audit, if you are happy for us to proceed.

  4. REPORT, RECOMMENDATIONS & QUOTE TO IMPLEMENT

    After our audit, we give you a report and a comprehensive set of recommendations. We will also give you a quote to implement those recommendations.

  5. IMPLEMENT & INDUCTION PROGRAM

    We implement all the recommendations. We then organise an induction program for you and your staff to introduce you to the updates system and train you on the new policies and access control.

  6. POST-IMPLEMENTATION CHECKS AND REVISIONS

    We will then schedule bi-annual check ups to make sure that all the security and redundancy is still as robust as when we commissioned it. We also make revisions to security policies and redundancy processes based on how your business has evolved.

What areas of security and redundancy do we specialise in?

Our areas of expertise can be broadly classified into the following modules:

  • Anti Virus, Anti-Spyware & Firewalls
  • Password Policy & Documentation Protection
  • Business Contingency Planning
  • Data sensitivity level categorising
  • Standards, guideline & Procedures
  • Permit or deny resources
  • Stop attacks & Unauthorised entry
  • Physical access control and intrusion detection