Capability
Given recent high profile events in both the private and public sector, information security has never been higher on the board agenda. Reputation, trust and brand value can all be seriously affected by information loss and theft.
Security Audits and Threat & Risk Assessment are one of the most critical services that ensure the safety of sensitive and critical information and applications within your organisation by exposing all the vulnerabilities and provide room for timely remediation.
Audit Highlights
- Part A: Quick snap shot audit
- Part B: Focus areas audit in areas of high risk
- Part C: Audit recommendations and high-level business impact analysis

What we can do for you
- Information Security Policy and Risk Management Audit
- Information Security Organisation Audit
- Information Security Documentation Audit
- Information Security Monitoring Audit
- Cyber Security Incidents Monitoring Audit
- Physical and Environmental Security Audits
- Personal Security for Information Systems Audit
- Product and Media Security Audit
- Software, Network & Cryptographic Security Audit
- Access control & Working off-site Security Audit
What does this mean to you?
- Peace of mind and due to identification of vulnerabilities within the critical applications & websites of your organisation
- Assessment for your third party service providers such as cloud, application developers and hosting service providers
- Help reduce organisation’s insurance premiums
- Provides early detection and prevention of potential attacks
IS audits are one of the most critical service that ensures the safety of sensitive and critical information and applications within your organization by exposing all the vulnerabilities and provides room for timely remediation.
At least an annual internal audit means peace of mind and a reduction of risk to your business, reduced insurance premiums, early detection and mitigation of potential risks. On the other hand a retainer from Suraksha will provide more real time services for your business in conjunction with your own IT department to ensure ongoing risk mitigation. In the case of a cloud provider we can give you an independent third party assessment of your providers risk profile.