[vc_row type=”in_container” scene_position=”center” text_color=”dark” text_align=”left”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″]
[vc_row type=”full_width_background” bg_image=”1327″ bg_position=”center center” bg_repeat=”repeat” bg_color=”#000000″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”5″ bottom_padding=”5″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text][/vc_column_text][/vc_column][/vc_row]
[vc_row type=”full_width_content” mouse_based_parallax_bg=”true” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”20″ bottom_padding=”40″ class=”partners-slider-wrap”][vc_column enable_animation=”true” animation=”fade-in” column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text][/vc_column_text][/vc_column][/vc_row]
[/vc_column][/vc_row]
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text]
A company’s business performance directly depends on the efficiency of its IT infrastructure and business processes.
With iPA, you will have high caliber consultation on IT Auditing. This further allows you to monitor the performance of your business knowing fully that a company’s business performance depends directly on the efficiency of its IT infrastructure and business processes.
[/vc_column_text][/vc_column][vc_column_text]
[/vc_column_text]

IT Audit Practices
- IT Audit should be conducted regularly (e.g. once per year).
- A audit checklist should be made for each security level/OS, for simplicity.
- The auditor should be independent of the administration and be objective.
- The audit should check: Guidelines, Policies, Users, Management, IT Security managers, Administrators, IT Resources.
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text el_class=”about-company”]
[/vc_column_text][/vc_column]
Access Control
- Comprised of those policies and procedures that are designed to allow usage of data processing assets.
- We protect these from both physical and logical perspective.
- We prevent and detect unauthorized accesses or use.
- We will review the different access groups’s limit and decide what is the best to protect the assets.
[vc_column_text][/vc_column_text]
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text el_class=”about-company”]
[/vc_column_text][/vc_column]
[vc_column_text]
[/vc_column_text]

Physical Security
- We maintain written procedures relating to controls over the physical security of the computer equipment.
- We place the hardware such as servers/storage in an appropriate location to ensure security.
- We make policies for temporary access by employees, visitors, or outside vendors and use sign-in logs to keep track of their activities.
- We utilize monitoring software linked to the physical access device to electronically monitor computer room entrances.
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text el_class=”about-company”]
[/vc_column_text][/vc_column]
Program change control
- We maintain written procedures for controlling program changes through IT management and programming personnel.
- We use control software to manage source programs and object programs, especially production programs.
- We provide procedures for emergency program changes.
[vc_column_text][/vc_column_text]
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text el_class=”about-company”]
[/vc_column_text][/vc_column]
[vc_column_text]
[/vc_column_text]

Personal Computer and End-User Computing (EUC)
- We maintain written policies related to PC Security, Shareware, Maintaining PC software and Backup.
- We use access control software which is utilized for passwords, boot protection and restriction to install software.
- We provide documentation for critical applications.
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text el_class=”about-company”]
[/vc_column_text][/vc_column]
[vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″][vc_column_text]