IBIS Expert IT and AML Assessment Services Contact us Now!
IBIS IT Audits are usually pro-active, when clients want a threat assessment for their computer systems.
IT Audits include:
System-wide computer intrusion analysis and review;
Social engineering vulnerability assessment
including an examination of hiring practices for high level password holders;
Assessment of procedural weaknesses that could lower resistance to attack;
Interviews with specific personnel who have access to the system at various password levels;
Physical security survey relating to access to the computer, servers and systems.
Note: IBIS IT audits do not include running programs on your system, any physical or electronic technical manipulation of your servers, or making pseudo intrusion attacks on your network in the first instance.
Such methods may be put in use, but only after IBIS technical personnel have done an initial review and made a preliminary diagnosis.