Secure Assure services cover the following specific areas of Information Security:
- Secure Remote Access to internal or external systems
- Implementation of network security devices and services such as Firewalls, VPN’s and Intrusion Detection Systems
- Data protection, encryption and secure destruction
- Data recovery
- Anti spam, Anti virus and malware advice and protection
- Protection against identity and company data theft
We have been providing IT security services to a varied client base across the UK and overseas over the last 20 years.
Our clients include:
- Central Government Departments
- Local Government Departments and Agencies
- Utility Companies
- Call Centres
- Telecoms Providers
- Supermarket Chains
- Pharmaceutical Companies
At a more local level we have provided IT and information security services to the following types of client in Lancashire and the North West Of England.
- Physical Security Specialists
- Building Companies
- Joinery Companies
- Design Agencies
- Web Development Agencies
We can advise on potential or existing risks and threats to your business, and give sensible advice on how to reduce them.
At all times we will work to ensure that there is the correct balance between reducing risks, and the costs and complexity associated with risk management processes.
We have found that all our clients, however small their operation, benefit from our IT security services. Many of our existing clients are happy to provide testimonials to vouch for the quality and dedication that we provide for them on a regular basis.
Information security is all about protecting information and not just computers. It is primarily concerned with with protecting information confidentiality, integrity and availability (CIA).
But what do we mean when we talk about protecting your valuable company information ?
In short, protecting confidentiality means that we recommend controls such as encryption or email blocking to protect information from unauthorised or accidental disclosure.
Protecting integrity would involve controls that prevent data from being corrupted by malware, disgruntled personnel, or hackers.
Protecting availability of your data could be via the implementation of redundancy for critical systems, or a backup and recovery process that will give you a clear recovery path in the event of a major disaster or other forms of system loss.
Computer security (as mentioned above) is a specific approach that concentrates on securing computers from threats such as viruses, online data theft and physical data theft.
Information Assurance is the process of reviewing a system and providing written evidence and summarisation that the system is adequately secured to hold information i.e. a system health check based on a given set of security criteria.