Security & Audit

IT&C audit

Achieve your business goals by aligning IT&C services.

The IT audit involves the examination and evaluation of the infrastructure and the communication system, internal policies as well as the information systems of an organization, their alignment with best practices and reporting to the reference standards  (ISO 27001-27002, iTIL, Cobit, Togaf, etc. ) 

Auditors examine not only IT&C system compliance but also general business and financial controls involving information technology (IT&C) systems. 

Why do an IT&C Audit:
  •  to make sure the processes work properly 
  •  to determine the risks on a company’s information assets 
  •  to discover vulnerabilities
  • to save through the efficient use of IT solutions 
  • to determine inefficiency in IT systems 
  • for analyzing the integrity of your networks 
  • to ensure that processes are in accordance with laws and IT standards 
  • to reduce the risk of fraud 

We are sure that we can help you improve the performance of your business. We can create value for your business by using the knowledge, techniques, experience and assets possessed by Convex Network employees.

Our IT&C audit services include: 

  • IT&C assessment 
  • Identifying IT risks 
  • Information security management 
  • Business continuity management 
  • Business support and internal processes 
Security Audit

Information and its processing systems are among the most important assets of an organization and therefore they must be properly protected. Organizations are heavily dependent on IT&C systems for operations. 

  

The continuous increase in both the complexity of IT&C systems and the risks and threats to which they are subject make ensuring information security a priority for decision makers. In addition, ensuring the security of information can be imposed on organizations by the specific norms of the activity sector or by the regulations in force. 

The main activities and possible objectives that can be analyzed in detail during an IT&C security audit process could be the following: 

  

Security policy and procedures:

  • Communications network security and performance; 
  • Security of systems and applications; 
  • Ensuring operational continuity and protection in case of disaste 
  • Data confidentiality and integrity 
  • Protection of personal data 
  • Traceability of transactions 
  • Identification, detection and prevention of unauthorized access to the system 

Based on the conclusions resulting from the evaluation process, an action plan will be developed with the main technical and procedural measures that are recommended to be implemented to increase the general level of security and align with the existing standards and practices in the field.