360 SECURITY
KENYA IS AMONG TOP 10 COUNTRIES IN THE CONTINENT WITH THE HIGHEST NUMBER OF PEOPLE EXPOSED TO CYBERCRIME
IT Security For Business – Why XC360?
Security Expertise is in high demand. Intel estimates there will be anywhere between 1 and 2 million unfulfilled IT security jobs worldwide by 2025. Security expertise will come at a premium and filling and keeping that role adequately filled internally will prove challenging. Our industry expertise and experienced teams means we always have the resources and knowledge to resolve and mitigate security challenges quickly, capably and reliably.
Modern security strategies require mastering an entire suite of technologies and the ability to implement and integrate varied technology solutions whilst minimising downtime and performance degradation. Our teams have a varied, but in depth skillset that means you can leverage their span of knowledge and specialisms to protect and secure your organisation to the highest level.
Delivering IT services is our only Business and as such we have robust training schemes in place to attract the best, develop the best and keep the best talent focussed on protecting your Business.
Our breadth of services are delivered and managed through a number of cutting edge enterprise tools, tools that enable our team to take advantage of IT automation, centralised monitoring and management to ensure services are delivered efficiently, manged professionally and monitored 24*7. Which ultimately means you don’t have to absorb the costs of delivering these capabilities.
Our unique position in the industry means we have a host of strong relationships with multiple security vendors coupled with our home-grown talent and proprietary services. We can intelligently operate vendor relationships, effectively integrate and maintain solutions and provide the right blend of security solutions and advice to keep threats at bay.
- 5 in 131 emails contain ransomware
- 43% of cyber attacks are aimed at SMEs
- 63% of breaches are caused from stolen or weak passwords
- Insider threats contributes up to 50 percent of breaches
XC360 SECURITY SERVICES
To get more details on our IT Security Assessment service offering, download our IT security Audit brochure below;
FAQs
Why do I need security audit?
- It reveals risks introduced by new technology or procedures within your organization.
- To assess your security threat level and exposure within your organization.
- Check to see if your current security plan is sufficient.
- Check to see if your security training is making a difference from one audit to the next.
- Prove the organization is compliant with regulations – HIPAA, SHIELD, CCPA, GDPR, etc.
What are the types of security audits?
We provide two types of audits: 1: Internal assessment:
- Analyses organisations IT processes, data access and control.
- Weaknesses in network devices – checking if devices are patched with the latest security updates, analysing configurations of firewalls, server and any other network devices.
- Analyzing accessibility of confidential data and restrictions in place.
- Assessing DR and business continuity procedures/plans.
- Compliance Audit: only certain parameters are checked to see if the organization is complying with security standards.
- Due Diligence Questionnaires: used for an analysis of existing security standards in the organization.
2: External Assessment
- Penetration test: the auditor tries to break into the organization’s infrastructure.
- Vulnerability test: necessary scans are performed to find possible security risks.
- Many false positives may be present.
- Black Box Audit: the auditor only knows about the info that is publicly available regarding the organization that is to be audited.
How often should security audits be done?
One-Time audits after you introduce a defined threshold of change into your operation, Tollgate Audits before you introduce new software or services, and Portfolio Audits at least annually.
How much does it cost?
Price starting from Ksh 50,000. All depending on the size and complexity of the business.
How long does the process take?
Again, it depends on the size and complexity of the organisation of the IT infrastructure. Generally, for a small to medium organisation, it takes approximately 5 business days.