IT Security Services

Information Security Design and Implementation

IT security in any business is critical. It is very important that you design and implement a system that is robust and that can adapt to the growing threat that is IT security. There are factors that one should consider while designing the system •    Costs- How much money are you willing to spend initially? This is a tough question and can be answered by doing a risk and management assessment of your company.

•    Availability- A good system design will ensure availability to the system at all times.

•    A good design and implemented system will be able to cope with minor threats and adapt accordingly. For those major incidents the system will provide an alternative for business continuity and management of the risk.

•    A good design will ensure that the highest level of security is given for the information being retrieved/submitted.

Vulnerability Assessments

In today’s technology savvy environment it is almost impossible to create a system that will forever be ‘safe’. It is therefore critical that you create a set of steps/rules that need to be followed to avoid then. It is also very important, to continually update your systems. Conor Inc’s, vulnerability assessments helps you find those vulnerable spots in your company and gives you different solutions of dealing with them.

Penetration Testing

Penetration testing is a method computer security experts follow to simulate an attack on a single PC or many PC’s in a network. Penetration testing is vital because it helps to figure out where and how a malicous attack could occur. Due to the nature of the internet and the growth of technology, it is very important that an organization test their system annually or every time there is a system change.

Penetration testing is particularly successful at preventing financial loss through fraud by hackers or disgruntled employees. It also help create a sense of confidence by your customers and shareholders.

Penetration testing helps you to be proactive when it comes to dealing with threats and gives and in depth analysis that can assist in creating budgets.

Testing- We also provide testing in the following areas-

  • Internet and Intranet Testing
  • Web Applications Testing
  • Wireless Assessments

Security Breach Investigations and Redress

If a security breach was to occur it is important that you have an outside party investigate the circumstances that led to that breach. While in house investigations can sometimes offer answers to such critical questions, it is recommended that you seek help from a third party. Many security breaches are initiated by employees, or people with access to these systems.

Redress- Since a security breach can have devastating effect on a company, it is important to know how to remedy such a situation- both financially and also in the minds of your customers. Conor Inc will assist in the investigation and give you a thorough analysis on how it can be avoided in the future.

Business Continuity Planning

The saying that its not how you fall but how you get up summarizes business continuity. A business continuity plan takes the worst case scenario and assumes that you have had a threat (natural or man made) against the company- and helps define a set of steps that you can take to ensure your business continues to run smoothly.

Policies & Procedures

Rules and regulations set forth by governments and governing bodies must be followed. Conor Inc is always up to date with such rules and strive to ensure that our clients are too.