information

WE PROVIDE a wide range of professional Information Security services and solutions to assist you to increase your company's secure operation and become a realibel partner for your client. Contact us in order to diagnose you IT control environment to identify which areas need improvements either via to strengthen your existing controls or implement new safeguards and countermeasures. 



  • Information Security reviews: carry out audits according to local Information Security Act (e.g. Hungary 2013 L), Government Regulation on the protection of critical systems (e.g. Hungary 65/2013) and international standards (ISO27001, PCI)
  • Vulnerability assessment: review Information Security System controls based on confidentiality, integrity and availability, for special demand run customized technical analysis for the applied Information Security Systems (ethical hacking)

RISK MANAGEMENT

  • Possible response to identified risks: creating corrective action plan with milestones, due dates and corresponding risk owners
  • Establishment of administrative controls: creating polices, procedure and process control manuals
  • Building logical and physical controls: introduction of technical solutions with involving specialized professional teams
  • Awareness, education: building information security awareness program

OUR CLIENTS

RISK IDENTIFICATION

security

  • Monitoring of key risk indicators: introducing the monitoring of risk and performance indicators (KRI, KPI)
  • Maintenance of administrative controls: continuous documentation maintenance and updates
  • Vulnerability assessment: establish and run regular vulnerability assessment program
  • Repeated audits: carry out self-assessment reviews and preparations against local regulatory or international standards
  • Annual information security awareness program: prepare and conduct reoccurring awareness trainings

CONTACT US

RISK ANALYSIS

consulting

​​​​​bm

.

.

.

Feb/2 - WordPress sérülékenység

A sérülékenység kihasználásával...

Feb/2 - WordPress Sites Hacked

The critical vulnerability disclosed...

Feb/9 - Mirai botnet

Mirai bornet komoly rendszereket...

Feb/9 - The Mirai botnet

The botnet that broke the internet...

Article title

Article text will be here...

Article title

Article text will be here...

Article title

Article text will be here...

Article title

Article text will be here...

Article title

Article text will be here...

Article title

Article text will be here...

Article title

Article text will be here...

Article title

Article text will be here...

OUR TEAM members have professional certifications (CISA, CISM, CISSP, ISO27001 LA) and related university educations to serve our clients in quality manner. We gained  references and from countries across Europe which contributed to our broad experience to obtain.

IS NEWS

RISK MONITORING AND REPORTING

  • Business impact analysis: exploration of the relationship between IT and the business areas, determination of critical infrastructure in the light of the business strategy
  • Potential threats identification, preparation of risk registers: identification of potential threats and their likelihood coupled with Business impact that could occur in case of Business needs are not met

OUR SERVICES

  • Governmental institutions
  • Financial and law firms
  • Manufacturing companies
  • Healthcare companies
  • Consulting and service providers