A network firewall is a fundamental component of a network security infrastructure that acts as a barrier between a trusted internal network and untrusted external networks, such as the Internet. Its primary function is to monitor and control incoming and outgoing network traffic based on predetermined security rules and policies. By enforcing these rules, a network firewall helps protect an organization's network and data from unauthorized access, cyber threats, and potential security breaches.
Network firewalls are essential security devices that help protect organizations' networks from cyber threats and unauthorized access. They provide an important defense against potential security breaches and play a crucial role in network security strategy and risk mitigation.
A Web Application Firewall (WAF) is a cyber-security solution designed to protect web applications from a wide range of online threats and attacks. Unlike traditional network firewalls that focus on network traffic, WAF specifically targets the application layer of the Open Systems Interconnection (OSI) model. It sits between users and the web application server, filtering and monitoring HTTP and HTTPS requests and responses.
In other words, a Web Application Firewall is a critical component of a comprehensive cyber-security strategy, providing an extra layer of protection for web applications against a wide range of threats and attacks. WAFs play a crucial role in safeguarding sensitive data, maintaining application availability, and ensuring the security and integrity of web applications.
Securing Incident and Event Management (SIEM) is a critical process in cyber-security that involves securing the tools, infrastructure, and processes used for collecting, analyzing, and responding to security incidents and events. SIEM is essential for detecting and mitigating potential cyber-security threats and attacks, helping organizations maintain a strong security posture.
With the implementation of the SIEM solution, organizations can enhance their ability to detect and respond to cyber-security threats promptly, strengthen their overall security posture, and protect critical assets and sensitive data from potential cyber-attacks.
File Integrity Monitoring (FIM) is a cyber-security process that involves monitoring and detecting unauthorized or unexpected changes to files and file systems on a computer system or network. FIM is crucial for maintaining the integrity and security of critical files, configuration files, system files, and application files. It helps organizations detect potential security breaches, malware infections, and unauthorized modifications to critical files.
This solution (FIM) is a vital cyber-security practice that helps organizations detect unauthorized changes and maintain the integrity of critical files and systems. By continuously monitoring and analyzing file changes, FIM enables early threat detection, enhanced security, and compliance with industry standards and regulations.
Multi-factor authentication (MFA), also known as two-factor authentication (2FA), is a security process that requires users to provide two or more forms of identification or credentials to verify their identity before gaining access to a system, application, or online account. MFA is an essential security measure that adds an extra layer of protection beyond the traditional username and password authentication. It helps mitigate the risk of unauthorized access, data breaches, and identity theft.
By implication, Multi-factor Authentication (2FA) is a critical security measure that significantly strengthens user authentication by requiring multiple credentials to verify identity. By using a combination of factors, MFA helps protect against unauthorized access and data breaches, making it an essential component of a robust cyber-security strategy.
Database Activity Monitoring (DAM) is a cyber-security technology that provides real-time monitoring, auditing, and analysis of database activities and events. DAM solutions are designed to track and record all database transactions and access attempts, allowing organizations to detect and respond to suspicious or unauthorized activities quickly. The primary goal of DAM is to enhance the security and compliance of databases by providing visibility into user activities and protecting sensitive data from potential breaches.
Database Activity Monitoring is a critical cyber-security technology for protecting databases and sensitive data. By providing real-time monitoring, auditing, and analysis of database activities, DAM enhances security, enables compliance, and helps organizations respond effectively to potential threats and security incidents.
MDM (Mobile Device Management): It is a software solution that allows organizations to manage and secure mobile devices, such as smartphones, tablets, and laptops. MDM solutions can be used to:
MDM solutions are an important part of an organization's mobile security strategy. By using MDM solutions, organizations can help protect their data and devices from unauthorized access, data loss, and other security threats.
Endpoint detection and response (EDR) is a security solution that helps organizations detect and respond to security threats on their endpoints. Endpoints are devices that are connected to a network, such as laptops, desktops, Servers, mobile devices, etc.
EDR solutions use a variety of techniques to detect threats, including:
Once a threat is detected, EDR solutions can take a variety of actions to respond, such as:
These solutions are an important part of any organization's security posture. By using such solutions, organizations can help detect and respond to security threats on their endpoints, data breach risk reduction, and other security incidents.
28, Obanikoro Street, Obanikoro Estate,
Lagos, Nigeria.
This privacy policy describes InfoAssure Limited’s policies and procedures on the collection, use, as well as disclosure of your information when you subscribe to our services, it tells you how the law protects you and your privacy rights.
Personal Data Collected
We may ask you to provide Us with certain personally identifiable information that can be used to
contact or identify you. Personally, identifiable information may include, but is not limited to:
•
Email address
• Phone number
• Address
•
Name
• Date of Birth
Use of your Personal
Data
The company may use personal data for the following purposes:
• To provide and
maintain our service.
• For the performance of a contract
• To contact you
• To provide you with
news, special offers, and general information
• To manage your requests
Tracking
Technologies and cookies
We use cookies to help you navigate efficiently and perform certain
functions. Tracking technologies used are to improve our service. These cookies will only be stored in
your browser with your prior consent. You can choose to enable or disable some or all of these cookies
but disabling some of them may affect your browsing experience. You will find detailed information about
all cookies under each consent category below:
Types of cookies?
Functionality Cookies
Functional cookies help perform certain
functionalities like sharing the content of the website on social media platforms, collecting feedback,
and other third-party features. The details of cookies that we capture are Browser, Country, Date, Number
of visit times, IP Address, and Referrals.
Necessary Cookies
The cookies that are
categorized as “Necessary” are stored on your browser as they are essential for enabling the basic
functionalities of the site.
Analytics:
Analytical cookies are used to understand how
visitors interact
with the website. These cookies help provide information on metrics such as the number of
visitors, bounce rate, traffic source, etc.
Performance
Performance cookies are
used to understand and analyze the key performance indexes of the website which helps in delivering a
better user experience for the visitors.
Advertisement
Advertisement cookies are used
to provide
visitors with customized advertisements based on the pages you visited previously and to analyze the
effectiveness of the ad campaigns.
Administered by Cookeries
To whom we share your
Personal data:
We share your personal data with Service providers and third-party
organizations (Our Partners) based on the lawful purpose of processing.
Retention of your
personal data
InfoAssure will retain your personal data only for as long as it is necessary
for the purposes set out in this privacy policy. We will retain and use your personal data to the
extent necessary to comply with our legal obligations.
Security of your personal
data
The security of your personal data is important to us and we have processes
and necessary security tools in place to prevent unauthorized access or data breach
Your rights as
a data subject
• Right to be Informed
• Right of Access:
• Right to
Rectification:
• Right to Erasure:
• Right to Data portability:
• Right to Restrict
processing:
• Right to Object:
• Right not to be subjected to a decision based solely on automated
processing
Updates to this privacy policy
We regularly review and, when
appropriate update this privacy policy from time to time as our services and use of personal data evolve.
If we want to make use of your personal data in a way that we have not previously identified, we will
contact you to provide information about this and, if necessary, to ask for your consent. Also, we will
notify you of any changes by posting the new privacy policy on this page.
CONTACT
US
If you have any questions or complaints about our use of your information, we
would prefer you to contact us directly so that we can address your
complaint.
dpo@infoassureltd.com
28, Obanikoro Estate, Obanikoro, Lagos, Nigeria
+234 803 533
8896
This Privacy Notice applies to “INFOASSURE LIMITED's” website inquiry page (www.infoassureltd.com). The privacy of our Users is important to us, and we are committed to safeguarding it. Hence, this Privacy Notice explains the Personal Information and Personally Identifiable Information (PII) that we collect, why we collect it, and what we do with it.
PERSONAL DATA COLLECTED: (NAME, EMAIL ADDRESS AND ALL OTHER PIIs CAPTURED ON OUR DATA COLLECTION POINTS)
Purpose of Processing
We do not carry out automated decision-making on personal data collected. We process personal data based on consent
to:
1. Respond to your inquiries and fulfill your requests.
Retention Period
InfoAssure will retain your personal data only for as long as it is necessary for the purposes set out in this
privacy policy. We will retain and use your personal data to the extent necessary to comply with our legal
obligations.
Further Processing
INFOASSURE LIMITED shall request for data subject consent for additional processing of personal data other than the
lawful purpose of processing stated above.
Kindly refer to our Privacy
Policy for more details on our data privacy and protection culture.
By clicking “OK” you agree that INFOASSURE LIMITED can collect and process your personal data in accordance with
this privacy notice and our
website privacy
policy.
The Board and Management of InfoAssure Limited which operates in the Information technology sector are committed to preserving the confidentiality, integrity and availability of all physical and electronic information assets throughout the organization, in order to preserve its asset, legal, regulatory as well as contractual, compliance and image.
The Information Security Management Systems (ISO 27001) requirements will continue to be aligned with organizational goals and is also intended to be an enabling mechanism for information sharing, electronic operations, and reducing information & Technology related risks to acceptable levels.
InfoAssure Limited is committed to providing quality services to our customers, both internal and external by aligning Information Technology investments with organizational goals. InfoAssure Limited has aligned its processes and operations to the requirements of the ISO27001 standard to ensure, cyber resilience, protection of its information asset and maximization of benefit/returns on IT investments.
It is, therefore, InfoAssure policy to ensure:
Management is committed to the continual improvement of the ISMS in the Organizations.
Breach of the policy or security mechanism may warrant disciplinary measures, up to and including termination of employment/contract as well as legal action in line with the Cybercrime Prohibition Act 2015.
The Board and Management of InfoAssure Limited are fully dedicated to upholding the confidentiality, integrity, and availability of all physical and electronic information assets in the organization. Our commitment is essential to safeguard our assets, adhere to legal and regulatory requirements, meet contractual obligations, and preserve our reputation.
We recognize the significance of the Information Security Management System (ISMS) in accordance with ISO 27001 and the Quality Management System (QMS) aligned with ISO 9001. These integrated systems are instrumental in achieving our organizational objectives, facilitating secure information sharing, optimizing electronic operations, and effectively mitigating information and technology-related risks.
The management is firmly committed to sustaining the excellence of the ISMS and QMS in InfoAssure.
Any breach of this policy, or security mechanisms may result in disciplinary measures; including termination of employment/contract, and legal action in accordance with the Cybercrime Prohibition Act 2015.
This policy statement, reflects our organization's commitment to securing information, delivering high-quality services and continuous enhancement, tailored to the specific context of an IT GRC and Cybersecurity consulting firm. The integration of ISMS and QMS ensures an efficient and effective approach to risk management and fostering confidence among our clients and stakeholders.