{"id":10346,"date":"2024-01-14T23:10:04","date_gmt":"2024-01-14T23:10:04","guid":{"rendered":"https:\/\/convex-network.ro\/?page_id=10346"},"modified":"2024-06-18T22:34:38","modified_gmt":"2024-06-18T22:34:38","slug":"security-audit","status":"publish","type":"page","link":"https:\/\/convex-network.ro\/en\/cyber-security\/cyber-security-services\/security-audit\/","title":{"rendered":"Security &amp; Audit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10346\" class=\"elementor elementor-10346 elementor-2888\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-085f50d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"085f50d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d0496e\" data-id=\"2d0496e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-361cc02 elementor-widget__width-initial elementor-widget-widescreen__width-initial elementor-widget-laptop__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-aux_button\" data-id=\"361cc02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<button   class=\"aux-button aux-tiny aux-dark-orange aux-round aux-outline aux-uppercase aux-icon-left\" ><span class=\"aux-overlay\"><\/span><i aria-hidden=\"true\" class=\"aux-icon auxicon2 auxicon2-arrow-backward\"><\/i><span class=\"aux-text\">Back<\/span><\/button>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d1bed2 elementor-widget elementor-widget-aux_breadcrumbs\" data-id=\"8d1bed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aux-elementor-breadcrumbs\"><p class=\"aux-breadcrumbs\"><span><a href=\"https:\/\/convex-network.ro\/en\/\" title=\"Home\">Home<\/a><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-182a854 elementor-widget elementor-widget-html\" data-id=\"182a854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"text\/javascript\">    jQuery(document).ready(function() {     jQuery('#go-back').on('click', function() {       window.history.go(-1);        return false;     }); });   <\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-e0d58ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e0d58ce\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7978650\" data-id=\"7978650\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2bc89f6 aux-appear-watch-animation aux-fade-in-right elementor-widget elementor-widget-aux_modern_heading\" data-id=\"2bc89f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h6 class=\"aux-modern-heading-primary\">Security &amp; Audit<\/h6><div class=\"aux-modern-heading-divider\"><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-311b910 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"311b910\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e032aaf\" data-id=\"e032aaf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c41b27 elementor-widget__width-initial aux-appear-watch-animation aux-slide-from-bot elementor-widget elementor-widget-aux_modern_heading\" data-id=\"9c41b27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><p class=\"aux-modern-heading-primary\"><\/p><h4 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">IT&amp;C audit<\/span><\/h4><div class=\"aux-modern-heading-description\"><p><span class=\"TextRun SCXW85011567 BCX0\" lang=\"RO-RO\" xml:lang=\"RO-RO\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW85011567 BCX0\">Achieve<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW85011567 BCX0\">your<\/span><span class=\"NormalTextRun SCXW85011567 BCX0\"> business <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW85011567 BCX0\">goals<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW85011567 BCX0\">by<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW85011567 BCX0\">aligning<\/span><span class=\"NormalTextRun SCXW85011567 BCX0\"> IT&amp;C <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW85011567 BCX0\">services<\/span><span class=\"NormalTextRun SCXW85011567 BCX0\">.<\/span><\/span><\/p><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98763a9 elementor-widget elementor-widget-text-editor\" data-id=\"98763a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The IT audit involves the examination and evaluation of the infrastructure and the communication system, internal policies as well as the information systems of an organization, their alignment with best practices and reporting to the reference standards\u00a0 (ISO 27001-27002, iTIL, Cobit, Togaf, etc. )<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Auditors examine not only IT&amp;C system compliance but also general business and financial controls involving information technology (IT&amp;C) systems.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-d41f7ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d41f7ce\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-897f444\" data-id=\"897f444\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6384ae7 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"6384ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-6384ae7\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-custom-id-offset=\"500\" data-accordion-id=\"6384ae7\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"why-do-an-itc-audit\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1041\"><span class=\"eael-accordion-tab-title\">Why do an IT&amp;C Audit:<\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-1041\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"why-do-an-itc-audit\"><ul><li><span>\u00a0to make sure the processes work properly<\/span><span>\u00a0<\/span><\/li><li><span>\u00a0to determine the risks on a company&#8217;s information assets<\/span><span>\u00a0<\/span><\/li><li><span>\u00a0to discover vulnerabilities<\/span><\/li><li><span>to save through the efficient use of IT solutions<\/span><span>\u00a0<\/span><\/li><li><span>to determine inefficiency in IT systems<\/span><span>\u00a0<\/span><\/li><li><span>for analyzing the integrity of your networks<\/span><span>\u00a0<\/span><\/li><li><span>to ensure that processes are in accordance with laws and IT standards<\/span><span>\u00a0<\/span><\/li><li><span>to reduce the risk of fraud<\/span><span>\u00a0<\/span><\/li><\/ul><p><span>We are sure that we can help you improve the performance of your business. We can create value for your business by using the knowledge, techniques, experience and assets possessed by Convex Network employees.<\/span><\/p><h4><span>Our IT&amp;C audit services include:<\/span><span>\u00a0<\/span><\/h4><ul><li><span>IT&amp;C assessment<\/span><span>\u00a0<\/span><\/li><li><span>Identifying IT risks<\/span><span>\u00a0<\/span><\/li><li><span>Information security management<\/span><span>\u00a0<\/span><\/li><li><span>Business continuity management<\/span><span>\u00a0<\/span><\/li><li><span>Business support and internal processes<\/span><span>\u00a0<\/span><\/li><\/ul><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"security-audit\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1042\"><span class=\"eael-accordion-tab-title\">Security Audit<\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-1042\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"security-audit\"><p><span>Information and its processing systems are among the most important assets of an organization and therefore they must be properly protected. Organizations are heavily dependent on IT&amp;C systems for operations.<\/span><span>\u00a0<\/span><\/p><p><span>\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>The continuous increase in both the complexity of IT&amp;C systems and the risks and threats to which they are subject make ensuring information security a priority for decision makers. In addition, ensuring the security of information can be imposed on organizations by the specific norms of the activity sector or by the regulations in force.<\/span><span>\u00a0<\/span><\/p><p><span>The main activities and possible objectives that can be analyzed in detail during an IT&amp;C security audit process could be the following:<\/span><span>\u00a0<\/span><\/p><p><span>\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Security policy and procedures:<\/span><\/p><ul><li><span>Communications network security and performance;<\/span><span>\u00a0<\/span><\/li><li><span>Security of systems and applications;<\/span><span>\u00a0<\/span><\/li><li><span>Ensuring operational continuity and protection in case of disaste<\/span><span>\u00a0<\/span><\/li><li><span>Data confidentiality and integrity<\/span><span>\u00a0<\/span><\/li><li><span>Protection of personal data<\/span><span>\u00a0<\/span><\/li><li><span>Traceability of transactions<\/span><span>\u00a0<\/span><\/li><li><span>Identification, detection and prevention of unauthorized access to the system<\/span><span>\u00a0<\/span><\/li><\/ul><p><span>Based on the conclusions resulting from the evaluation process, an action plan will be developed with the main technical and procedural measures that are recommended to be implemented to increase the general level of security and align with the existing standards and practices in the field.<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Back Home Security &amp; Audit IT&amp;C audit Achieve your business goals by aligning IT&amp;C services. The IT audit involves the examination and evaluation of the infrastructure and the communication system, internal policies as well as the information systems of an organization, their alignment with best practices and reporting to the reference standards\u00a0 (ISO 27001-27002, iTIL, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10334,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"class_list":["post-10346","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/comments?post=10346"}],"version-history":[{"count":0,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10346\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10334"}],"wp:attachment":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/media?parent=10346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}