Information Technology Consulting (IT)

Information Technology Consulting (IT)

What would be the consequences if key information was to be lost from your business? How would the organization be affected if non-authorized third parties had access to confidential information of your business? Have you estimated the cost for your business if there is a failure in the information systems for a period of time? Would you be able to continue with your operations?

IT Risks

Our service focuses on the development of an IT risk analysis with the purpose of obtaining an initial overview of IT risks that the company faces. This evaluation serves as a framework to prioritize management risk activities in a more detailed way.

The evaluation allows:

  1. Identifying the areas of potential high risk through the business
  2. Have a general overview of the main aspects of risk in which the business is exposed. Identifying these aspects is highly important in order to manage them.
  3. Provide guidelines for main risk scenarios, which constitute an essential input for a detailed analysis of the risks.

The end product is a report that contains an inventory of the risks found.

Information Security System

Information constitutes an essential asset for any Company nowadays and, therefore, requires protection. Our service focuses on the development of an action plan that enables to establish inside the organization a continuous process of security, with the aim to achieve and maintain an adequate level of security.

The final result of our work is a report that includes:

  • A general security policy appropriate for the organization
  • An inventory of the company’s systems (infrastructure, IT Systems, Networks, Applications, Organization, Staff)
  • The requirements for system protection
  • The threats to which the systems are exposed
  • The controls suggested to minimize the threats
  • The actual state of the implementation of the suggested control.

Business Continuity Plan

Continuity refers to the capacity of an organization to get through events that may have a negative impact over it; these events may include a fire, floods, power blackouts or even computer virus, theft of assets or intentional damage over the assets.

The Planning of the Business Continuity is the process to achieve this capacity and maintain it, and is a vital part of management of the information systems security.

Our service focuses on the development of a business continuity plan, following the specific methodology that comprises the following stages:

  1. Identifying and organizing threats
  2. Developing an impact analysis on the Company
  3. Create a response and recovery plan
  4. Test such plan

The end product is a Business Continuity Plan that involves all the stages mentioned before.

Audit for the process of introducing a management system

In every process of introducing a system there are several stages and tasks that must be carried out in order to grant a proper process.

Our methodology enables us to analyze if these stages where completed and the effects it may cause in the future, not being able to complete with certain stages.