Cyber Security

As we continue to digitise our everyday working lives, technology security threats have a greater potential to disrupt business activity. The consequences of a successful cyber-attack can be devastating, not to mention very expensive. Specialist expertise and assistance is limited and out of reach for many SMEs so it’s important to think about what you can do in line with your budget to safeguard your network and information assets.

How we can help

Despite the challenges posed by cyber threats, there are simple actions that businesses can take to protect their data and core systems. At Findex, we offer a comprehensive suite of cyber security services to support SMEs to help prevent a cyber incident from occurring, detect malicious software in an IT environment and respond to a cyber-attack if it should occur;

Cyber Governance & Resilience:

  • Health checks and assessments
  • Framework Reviews
  • Control Reviews
  • Threat & Risk Assessments
  • Incident Response Planning
  • Employee Training
  • Third Party Assessments

Data Protection & Information Security

  • Confidential Information Reviews
  • Information Security Assessments
  • Physical Security Reviews
  • Privacy Impact Assessments
  • Data Protection Consulting

Security & Forensic Analytics

  • Security Incident Forensics
  • Security Analytics
  • Cyber fraud analytics
  • System Activity Analysis
  • User Behaviour Analysis
  • Logging & Monitoring Analysis
  • System Intelligence Collection

System Security Review and Testing

  • System Security Reviews
  • Network Penetration Testing
  • System Vulnerability Assessment
  • Social Engineering Testing (Phishing)
  • Physical Security Reviews

Security Incident and Data Breach Response

  • Digital and Forensic Investigations
  • Security Incident Investigations
  • Network or Systems Intrusions
  • Privacy and Data Breach Response
  • Cyber and Computer Fraud
  • Critical Systems and Technology Incidents
  • Employee Misconducts Investigations
  • Corporate Fraud and Financial Investigations
  • Accounting Irregularity and Breach Investigations

Post Incident Response

  • Crisis and Incident Communications Support
  • Root Cause Analysis
  • Post Breach Review
  • Security Awareness Training

Related articles