SlideShare a Scribd company logo
1 of 2
Download to read offline
Iain Young IT Consulting
Local Security Against Global Threats



Securing your information
In today Business environment companies
gather and use information of various types. It is
therefore dependant on the companies to act
 in a responsible manner when processing
information.
There are laws in place to protect the
management of information.
Example: Computer misuse act
           Data protection act
           Copyright legislation
          The official secret act (for government employees)


Information Security Management Systems and SMEs
As a small business it can be daunting to enforce a security management system that is what
we specialise in and take the load of the business owner.
Due to the amount of information and work required when planning a management system
we use our experience in completing the whole process as a complete package for the
client.

This involves risk assessment of both hardware and procedures with the business and when
completed, it will be used to draw up a plan to create a policy for the company to use.
Security is not just the responsibility of the business owner but all the staff within, therefore
we create security awareness presentation to suit each business and there specific
requirements.




   Services                                          Philosophy
   Risk assessments                                  It is to have a plain English approach to
   Security policy planning                          how Information Security is introduced
   Business continuity planning                      into Small and Medium Businesses.
   Security awareness training
                                                     A plain English explanation to what it
   These are combined into service                   is.
   packages
Iain Young IT Consulting
 Local Security Against Global Threats


                                                                 The “SmartSec” process
                        Spot
                                                                 Sensible      a common sense
                                                                                approach.

                                                                 Manageable     can be managed
                                                                                and understood by
                                                                                all involved.

Manage             SmartSec                    Plan              Achievable     can be easily
                                                                                achieved.

                                                                 Realistic     be real and suitable
                                                                               the business.

                                                                 Timely        can be introduced
                                                                               timely manor.
                     Integrate
                                                                 Sec            securing your
                                                                                Information.




  Spot                                                Manage
  After getting to know your business and             While using the SmartSec process to manage
  understand your needs carry out risk                your information, we will be in a position to
  assessment in order to pinpoint any                 answer any questions and resolve and any
  weaknesses in your processes and systems            problems.
  when handling in information.
                                                      The SmartSec process is carried out by
  Plan                                                experienced staff and use the best practices of
  When the assessment has been completed              ISO27001 and ISO 38500 and business
  your consultant will sit down with you and          continuity management.
  go through all points of weakness found
  during the assessment. We can then make
  the best recommendations to meet your
  needs.

  Integrate
  Integration of the recommendations and
  policies that we have created to meet your
  business needs. Also carry out training to           Tel:07845164174
  raise security awareness though out the              Email: iainyoungit@gmail.com
  company                                              Website: www.iainyoungit.co.uk

More Related Content

Similar to Securing your info

Solution Spotlight IT Consulting Services
Solution Spotlight  IT Consulting ServicesSolution Spotlight  IT Consulting Services
Solution Spotlight IT Consulting ServicesThe TNS Group
 
Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123tommy62dm
 
Seekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingSeekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingPaul Enright
 
2005 issa journal-risk-management
2005 issa journal-risk-management2005 issa journal-risk-management
2005 issa journal-risk-managementasundaram1
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.Mindtree Ltd.
 
Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfChinatu Uzuegbu
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Securex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT MonitoringSecurex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT MonitoringCA Nimsoft
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...IT Network marcus evans
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptxRachatrinTongrungroj1
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Asim Jahan
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookCIO Look Magazine
 

Similar to Securing your info (20)

Solution Spotlight IT Consulting Services
Solution Spotlight  IT Consulting ServicesSolution Spotlight  IT Consulting Services
Solution Spotlight IT Consulting Services
 
Cit security offering-overview_20111123
Cit security offering-overview_20111123Cit security offering-overview_20111123
Cit security offering-overview_20111123
 
Seekintoo-SIEM Consulting
Seekintoo-SIEM ConsultingSeekintoo-SIEM Consulting
Seekintoo-SIEM Consulting
 
2005 issa journal-risk-management
2005 issa journal-risk-management2005 issa journal-risk-management
2005 issa journal-risk-management
 
Managed firewall service.
Managed firewall service.Managed firewall service.
Managed firewall service.
 
Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Securex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT MonitoringSecurex Selects Nimsoft to Streamline IT Monitoring
Securex Selects Nimsoft to Streamline IT Monitoring
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
How Infosec Can Become a Business Enabler: Interview with: Dr Tim Redhead, Di...
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan7 Steps To Developing A Cloud Security Plan
7 Steps To Developing A Cloud Security Plan
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Influential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO LookInfluential Business Leaders in Security services | CIO Look
Influential Business Leaders in Security services | CIO Look
 

Securing your info

  • 1. Iain Young IT Consulting Local Security Against Global Threats Securing your information In today Business environment companies gather and use information of various types. It is therefore dependant on the companies to act in a responsible manner when processing information. There are laws in place to protect the management of information. Example: Computer misuse act Data protection act Copyright legislation The official secret act (for government employees) Information Security Management Systems and SMEs As a small business it can be daunting to enforce a security management system that is what we specialise in and take the load of the business owner. Due to the amount of information and work required when planning a management system we use our experience in completing the whole process as a complete package for the client. This involves risk assessment of both hardware and procedures with the business and when completed, it will be used to draw up a plan to create a policy for the company to use. Security is not just the responsibility of the business owner but all the staff within, therefore we create security awareness presentation to suit each business and there specific requirements. Services Philosophy Risk assessments It is to have a plain English approach to Security policy planning how Information Security is introduced Business continuity planning into Small and Medium Businesses. Security awareness training A plain English explanation to what it These are combined into service is. packages
  • 2. Iain Young IT Consulting Local Security Against Global Threats The “SmartSec” process Spot Sensible a common sense approach. Manageable can be managed and understood by all involved. Manage SmartSec Plan Achievable can be easily achieved. Realistic be real and suitable the business. Timely can be introduced timely manor. Integrate Sec securing your Information. Spot Manage After getting to know your business and While using the SmartSec process to manage understand your needs carry out risk your information, we will be in a position to assessment in order to pinpoint any answer any questions and resolve and any weaknesses in your processes and systems problems. when handling in information. The SmartSec process is carried out by Plan experienced staff and use the best practices of When the assessment has been completed ISO27001 and ISO 38500 and business your consultant will sit down with you and continuity management. go through all points of weakness found during the assessment. We can then make the best recommendations to meet your needs. Integrate Integration of the recommendations and policies that we have created to meet your business needs. Also carry out training to Tel:07845164174 raise security awareness though out the Email: iainyoungit@gmail.com company Website: www.iainyoungit.co.uk