Trilet
IT Security & Technology Consulting
Security
Our security portfolio is a collection of services designed to create, adapt and operationalise a security strategy that addresses your organisation's most likely threats and top risks while remaining accountable to business objectives.
Audit
Complete systems auditing informed by the latest threat intelligence, broad knowledge about the most advanced defenses and controls, and a clear understanding that security measures must be aligned with business objectives.
Compliance
We help clients identify vulnerabilities and assess real business risk, meet PCI, ISO 27002, GDPR, and other security compliance mandates more efficiently and effectively, and devise security and governance programmes that fit a client's environment.
LATEST NEWS
-
What the GDPR means for your business
The GDPR replaces the Data Protection Directive 95/46/EC. Organizations found in non-compliance will face heavy fines: €20 million or 4 percent of global revenue per infraction. This could mean millions, or even billions of pounds in fines for large companies...
More -
FCA guidance for firms outsourcing to the cloud
The Financial Conduct Authority (FCA) has finalised its guidance for regulated firms outsourcing IT functions to the cloud. The guidance builds on the FCA’s existing approach. The FCA defines outsourcing as a third party delivering services on behalf of regulated firms, and the...
More -
Ransomware threat on the rise
Ransomware is fast becoming a ubiquitous security threat, with nearly 40% of all businesses experiencing an attack in the past year, according to research from computer security firm Malwarebytes. The figure is even worse in Britain, where 54% of surveyed businesses had been targeted with...
More -
Forget 2-factor, here comes context-aware authentication
In the past year, we have heard much about two-factor authentication (2FA) a system whereby users need to enter two individual items to log in to a service -- their password and (generally) a randomly generated code supplied from a mobile application or via text message..
More