We have years of experience in providing information assurance and information risk management services to all kinds of businesses. It does not matter whether you run a small start-up company or a large corporation, we will ensure your assets are protected and maintained efficiently. Our aim is to find the best form of protection for your business and provide you with the means to manage risks effectively in order to minimise financial costs and prevent damage to your reputation.
A cookie is a small file which asks permission to be placed on your computers hard drive. Once you agree, the file is added and the cookie helps analyse web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes and dislikes by gathering and remembering information about your preferences.
We use traffic log cookies to identify which pages are being used. This helps us analyse data about web page traffic and improve our website in order to tailor it to customer needs. We only use this information for statistical analysis purposes and then the data is removed from the system.
Overall, cookies help us provide you with a better website by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us.
You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. This may prevent you from taking full advantage of the website.
This is the act of making information available only to those that are authorised. If done properly, only the intended recipient should receive and/or be able to read/use the information. No unauthorised individual should be able to see the data. A common implementation for this is peer-2-peer encryption.
This refers to the continuous act of ensuring that data is valid, accurate and consistent. It involves making sure that data is not altered unless absolutely necessary, by an authorised individual or so that it is accurate (e.g. changing record of a user’s address if they move house). If properly maintained, the data can be considered trustworthy. The range of solutions for this depend on how deeply you want to account for, the basic solution is correctly configured file permissions and access controls whereas more in-depth strategies such as checksums can verify integrity even in the event of obscure electrical interference.
If data or a service has availability, in the context of information assurance, that means it is usable. This may sound simple but involves the assurance that under any reasonably expectable circumstance, a user is still able to access the data or service that they are used to accessing. You need to be able to account for any hardware or software failures with sufficient backup and redundancies in place, resource bottlenecks caused by a surge of traffic whether natural or intentional (e.g. DDOS attack) all the way down the line to the worst case, disaster recovery. There are potential solutions to account for all of these cases but understanding them and being able to implement them are tricky.