CogITo IT Ltd © cogito, vivo, aspiro IT!

COGITO
[ko-jit-o] : to think, ruminate, ponder, consider, plan

Although not always victims of direct IT security attacks, small to medium sized businesses are still vulnerable to large scale worm or virus outbreaks.


IT security policies designed to safeguard the integrity of hardware, software and data are often overlooked.


At a minimum, security threats to critical IT assets should be addressed and the loss of such assets should be detailed in Risk Assessment.


Your IT security policy should be tailored to the size and resources of your organisation.


Following a full Information Systems audit, which is based entirely on best practices, we are able to provide detailed Risk Assessments which includes the following areas:


- Servers and workstations
- Systems access and security
- Virus and Spyware protection
- Firewall resilience
- Back up strategy
- Disaster recovery procedures


Security