Tok Pisin

Information Security

Information Access Management

It is vital to manage who has access to which information held by your organisation. This means physically enabling and restricting access to various information, and also having the ability to monitor who is accessing or has...

Data Breaches / Security Incidents

Your organisation should have a process in place for managing and reporting events or chains of events that compromise the confidentiality, integrity or availability of its information....

Information Risk Assessments

In any aspect of business, it is impossible to safeguard against risks if you do not know what they are. Therefore, prerequisite to an information security strategy, is the preparation of an information risk assessment so that...

Data Loss Prevention

Preventing your data from loss or falling into the wrong hands should be a key part of your IT strategy … and day-to-day housekeeping. The consequences of such events can include breaches of confidentiality, non-compliance...

Data Encryption

If your confidential data and communications (for example emails) are accessed by individuals or other organisations not authorised to see them, the consequences can be very damaging … fraud, identity theft, espionage and...

Backups

The information held on your computer systems and devices is probably irreplaceable. If it is lost or corrupted as a result of theft, being criminally compromised, physical damage or technical failure, your organisation faces...