Cybersecurity
Legal and Ethical Obligations for Cybersecurity
Our approach
We recognize that your Board of Directors has both legal and ethical responsibilities to safeguard your company's data and your customers' sensitive information from potential compromise. These responsibilities are dictated by various regulations, including the ICT Act, Data Protection Act, Cybersecurity and Cybercrime Act, and Electronic Transaction Act, and in some cases, regulations from the Bank of Mauritius and the Financial Services Commission.
Given that compromission entails data loss and breaches of Confidentiality, Integrity, or Availability (CIA), we acknowledge the utmost significance of upholding a robust security stance to protect your valuable assets, sensitive data, and ensure regulatory compliance across your Information System ecosystem.
Network
- Router, Switch, Wifi, Firewall
- Evaluate the network nodes effectiveness in terms of prevention of unauthorized access and potential intrusions.
Information system
- Apps, Cloud, Database
- Assess the security posture of end-user devices configurations and protection.
Organization
- Policies, Frameworks
- Review the existing security controls and alignment with the law. Regulatory obligations and the industry best practices.
Analysis & KPI
- Cybersecurity dashboard
- Conduct a thorough vulnerability audit to identify weaknesses to providing advices for remediation.
Tailored
- Value for Money
- The program is tailored and optimized to meet the specific needs of your organization.
We provide assistance, comfort and expertise
Our team of experts adhere to industry-leading standards, best practices, and proven frameworks, with a particular focus on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) to assess your organization's capabilities in these critical areas :
- Identify Cybersecurity Threats
- Protect from Cyber Intrusions
- Response Analysis and Mitigation
- Detect Potential Compromission
Our Services
SecureScore
Cyber Health Diagnostic
- Overview of Cybersecurity posture
- Efficient self- assessment and evaluation
- Automated Reporting
SecureShield
Cybersecurity Audit
- Organization security
- Physical security
- Network security
- IT security
SecureBlueprint
Framework Deployment
- Identification of IT and Cybersecurity gaps
- Analysis and recommendations
- Establish and monitor remediation plan
- Implement ISO 27001 and ISO 27002
- Perform regular Penetration testing
- Review and update plan
Vigilant Guard
IT General Control
- IT Governance & Management
- Data Management
- Business Continuity Planning
- Information Security
- Change Management
- Outsourcing of IT infrastructure
CyberShield
End-User Training
- Educate users to protect information assets
- Objectives : Comprehensive program with practice
- Theory and practical sessions with laptops
- Course immediately actionable in personal life