Network-Architecture | Data Security | Audit Trail Evaluation| Compliance | Access Control
Security Audit
So you know what leaves your company
We seek out potential weaknesses due to our comprehensive security analysis of all the networks and devices concerning their vulnerability as well as their reliability.
Often it’s a „slip of the pen“ that causes security issues. That applies also to the World Economic Forum in 2011. Many credit card informations of many well-known participants such as Bill Clinton were stolen. That was only possible because the IT administration did not change the standardized SQL password of Microsoft so the Hackers could effortlessly copy all the datas. It starts at a simple level and goes further to report evaluation or a rule-based compliance check. For example, it’s not possible for employees to send Excel-Datas, which are encrypted or hold the word “Password”, by e-mail.
Moreover, data security or rather security privileges will be checked and documented regarding their technical availability and logical access control. Also will be all connection possibilities and firewall settings x-rayed in order to perform a plausibility check.
Upon request, we prepare a detailed documentation of all weaknesses and their remedies to improve security and traceability of transactions.