Our Cybersecurity Audit practice helps our clients identify potential risk, namely,
Technical Vulnerabilities through one-off or Persistent Penetration Testing (KEEP-IT-SECURE-24),
providing recommendations and support to mitigate identified issues.
We help our clients to identify their security risks and vulnerabilities and also the
compliance level of their Information Security Management Practice, in order to thoroughly
acknowledge their risks and are able to address them in accordance with the mitigation
recommendations provided by our audit team.
Audit projects are customized according to the needs and aims of our clients. They can be
technical component, processes, people or more broadly combined context oriented. They can
also be oriented to deal with questions related to compliance or regulation.
The kind of projects with higher demand in our Audit practice refer to Penetration Tests,
in which our consultants, in order to identify existing vulnerabilities, act as if they
Our team provides recommendations to mitigate the identified vulnerabilities. These Audits
may be one-shot or persistent, through the KEEP-IT-SECURE-24 service.
External or Internal Penetration Testing
Persistent Penetration Testing (KEEP-IT-SECURE-24)
Mobile Applications Penetration Testing (Android, iOS or WindowsPhone)
Security Audit for Gambling Equipment
Data Breach Prevention
Testing specific Security Controls
Penetration Testing of IoT Appliances (Routers, Television, Drones, ...)
Security Audit/ Penetration Testing of SCADA / ICS networks
Security Audit Telecom Systems
Source Code Review
Technical Assessment of Architecture / Configuration
Digital Forensic Analysis
Audit / Evaluation of External Suppliers (3rd Parties)
Information Security Management Audit (ISO 27001)
Internal Security Audit ISO 27001