Vulnerability Assessment & Pen Test

INFORMATION TECHNOLOGY AUDIT(IT AUDIT) PROFESSIONAL SERVICES

As we continue to use Information Technology to drive our businesses, there is the need to also periodically audit its usage to ensure that the organization is not exposed and to provide management with the assurance that IT risks and controls are being monitored.

Our deliverables in this regard includes;

  • The training of your Audit staffs on IT risk and controls.
  • Hand holding your Audit staff to carry out an audit of your IT infrastructure.
  • Documenting the IT Audit report including recommended counter measures for presentation to management or board audit committee.
  • Thereafter we expect your staff to be able to carry out the exercise on their own going forward.

Call us today for Free presentation or discussion. It is affordable and Value Adding.

IT STRATEGY DEVELOPMENT

Developing your overarching IT strategy using best practice methodologies ensures that your IT is wholly aligned with your business vision, designed holistically to support the strategy and culture of your organization.

We work from a position of deep understanding of your business, so that the IT strategy we create with you delivers value where it counts, and performs as a valuable asset for enduring advantage. 

SECURITY AUDIT, VULNERABILITY ASSESSMENT/PENETRATION TESTING

We carry our general security Audit for organization based on best practices and global standards. We evaluate the existence and adequacy of all physical, logical, network, application security and advise management of the organization after the risk analysis of the best countermeasures. We also carry out both internal and external penetration/ vulnerability test on organizations perimeter.

TRAININGS ON ALL ASPECTS OF INFORMATION SYSTEMS SECURITY

We organize hands on training on all aspects of information systems security from physical, logical, Application, System development, BCP to network security. Our trainings are designed to meet the dynamic nature of technology and the attendant risks. We also handle trainings on some IT controls and Security such as CISA and CISSP.

TRAINING ON PRACTICAL INFORMATION SYSTEMS AUDIT AND CONTROL

We have observed over the years the gradual transition of the traditional audit to systems audit. Organizations are beginning to seek for individuals with practical knowledge of Information systems Audit and are ready to pay heavily to hire them. Individuals who have passed the CISA examination are still deficient in the practical application of the certification. It is in view of this that Rhythex have come up to the challenge of documenting and organizing a laboratory based practical system audit training for CISAs and non CISAs.

DEVELOPMENT AND IMPLEMENTATION OF BCP/DRP

A current and frequently tested business continuity plan is an insurance policy associated with partial or total information system loss. We develop, implement and test your disaster recovery/business continuity plan in order to mitigate and manage information Security Risk and achieve Enterprise-wide resilience.

INCOME ASSURANCE

We carry out income assurance for organization by re-computing all relevant charges and income using ACL. This is to ensure that the organization is not loosing income in any way and customers are not being overcharged or undercharged. We have assisted so many organizations to recover millions of naira in this area.