IT Assurance & Compliance

IT Assurance & Compliance

Broadly our services in IT Assurance & Compliance consist of:

  • a) Business Continuity Planning
  • b) Computer Crime Investigations
  • c) Training in Information Technology
  • d) Compliance with IS policies and procedures

a) Business Continuity Planning :- It is the process a company undergoes to create a prevention and recovery system from potential threats such as natural disasters or cyber-attacks. BCP is designed to protect personnel and assets and make sure they can function quickly when disaster strikes. It involves the following procedure:

b) Computer Crime Investigations :- This involves audit of any crimes committed, likely to be committed or can be committed by anyone having access to the computer systems of the Company. It ranges from recovering file systems on computers that have been hacked or damaged test security systems that are currently in place this can be done by trying various ways to hack into the corporation’s computer networks. At corporations, computer crime investigators also maximize optimal computer system performance levels.

Computer Crime Investigation involves:

  • • Analysing computer system crimes.
  • • Recovering data that was either destroyed or damaged.
  • • Gathering evidence
  • • Gathering computer system information.
  • • Maximizing optimal computer system performance levels.
  • • Reconstructing damaged computer systems.
  • • Preparing expert reports on highly complex technical matters.
  • • Testifying in court.
  • • Training law enforcement on computer related issues.
  • • Draft expert testimony, affidavits, and reports.
  • • Consult with clients, supervisors, and managers.
  • • Continually develop forensic skills through outside research and training.
  • • Recover password protected/encrypted files and hidden information.
  • • Convert recovered files and information into a format that is compatible with a corporation’s needs.
  • • Assess software applications for design flaws.
  • • Identify and recommend methods for preservation and presentation of computer evidence.
  • • An ability to work and collaborate well with a team.

c) Training in Information Technology

d) Compliance with IS policies and procedures