Why bother?

 The number of critical security breaches - including phishing attacks, spam, compromised devices and user accounts, physical break-ins, and access to servers and IT systems - is growing every year in Latvia.  


A cybersecurity audit will provide a clear and comprehensive overview of your organization's IT security risk landscape. Qualified cybersecurity experts and pentesters will identify your IT security risks, vulnerabilities, security misconfigurations, etc. Based on risk assessment, this audit can include:  

  • Compliance analysis according to ISO 27001, ISO 27017, MK442 and security risk assessment;  

  • Internal and external network scan for vulnerability and assessment;  

  • Web sites penetration tests;  

  • Most important system and network device configuration analysis;  

  • Cloud services settings review; 

  • Outsourced services agreements review; 

  • Classification of identified risks and detailed recommendation for risk mitigation.

What's in it for me?

Our experienced team of security professionals (CISA, CISSP, CEH, LPT) will assess the current situation with regards to IT security in your company, identify any risks associated with current IS configuration and deployment, as well as risks related to internal processes and documentation. Additionally, we will provide recommendations as to what activities should be performed for risk mitigation according to the best practices in IT security, as well as our expertise in the IT security field. 

What is the process?

A cybersecurity audit based on ISO 27001 controls (MK442 or PCI DSS, if required) will provide a comprehensive, independent assessment regarding the existing, actual security situation in your company. Experienced IT security specialists will help identify the risks associated with IT security in your company, classifying them according to the possible impact to your business and data security, as well as providing recommendations for risk mitigation activities. This service includes: 

  1.  Comprehensive assessment of the current IT security situation in your company; 
  2. Identification of any risks related to data and IT security within your company; 
  3. Scan for vulnerabilities in your perimeter and infrastructure;  
  4. As a result of the assessment, we will create a report which will include:  
  • Compliance analysis according to ISO 27001, ISO 27017, MK442 and security risk assessment;  

  • internal and external network scan for vulnerability and assessment;  

  • web sites penetration tests;  

  • most important system and network device configuration analysis;  

  • cloud services settings review; 

  • outsourced services agreements review; 

  • classification of identified risks and detailed recommendation for risk mitigation 

What are the benefits?

  • A comprehensive assessment of the IT security situation in the company. 
  • Independent review of risks related to cybersecurity. 
  • A cohesive action plan for improving IT security posture. 
  • Realistic recommendations regarding risk mitigation, according to your organization needs and available options. 

Let's protect.

We are happy to share our knowledge, experience and expertise. Let us know what you need, and we will contact you directly.