Most Innovative Company, South Africa, 2016, African Business Awards
Best Forensic Investigation Company, Africa, 2016, African Corporate Excellence Awards
Best in Security, Forensics & Investigations – 2016 – International Business Awards

Information Security

Information security is all about protecting information (and by implication, information systems) against unauthorized (or unintentional) access, use, disclosure, disruption, corruption, modification, duplication or destruction. An important component of information security is “information assurance”, which is concerned with maintaining the confidentiality, integrity and availability of information.

Information Security Defenses

  • Access control
  • Application security
    • Antivirus software
    • Secure coding
    • Security by design
    • Secure operating systems
  • Authentication
    • Multi-factor authentication
    • Two-factor authentication
  • Authorization
  • Data-centric security
  • Firewall (computing)
  • Intrusion detection system
  • Intrusion prevention system
  • Mobile secure gateway

Information security involves protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction, and it is concerned with maintaining the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Our information security consultants will work with you to secure your information and information systems and to develop dynamic, proactive, cost-effective information security policies and practices. Below you will find a very basic information security checklist that will give you an idea of the bare minimum that one should implement in order to provide a reasonable measure of information security. If your organization does not have these measures in place then feel free to contact us for no-obligations advice about getting started with information security.