Trilet

IT Security & Technology Consulting

Security

Our security portfolio is a collection of services designed to create, adapt and operationalise a security strategy that addresses your organisation's most likely threats and top risks while remaining accountable to business objectives.

Audit

Complete systems auditing informed by the latest threat intelligence, broad knowledge about the most advanced defenses and controls, and a clear understanding that security measures must be aligned with business objectives.

Compliance

We help clients identify vulnerabilities and assess real business risk, meet PCI, ISO 27002, GDPR, and other security compliance mandates more efficiently and effectively, and devise security and governance programmes that fit a client's environment.

LATEST NEWS

  • Post

    What the GDPR means for your business

    The GDPR replaces the Data Protection Directive 95/46/EC. Organizations found in non-compliance will face heavy fines: €20 million or 4 percent of global revenue per infraction. This could mean millions, or even billions of pounds in fines for large companies...

    More
  • Post

    FCA guidance for firms outsourcing to the cloud

    The Financial Conduct Authority (FCA) has finalised its guidance for regulated firms outsourcing IT functions to the cloud. The guidance builds on the FCA’s existing approach. The FCA defines outsourcing as a third party delivering services on behalf of regulated firms, and the...

    More
  • Post

    Ransomware threat on the rise

    Ransomware is fast becoming a ubiquitous security threat, with nearly 40% of all businesses experiencing an attack in the past year, according to research from computer security firm Malwarebytes. The figure is even worse in Britain, where 54% of surveyed businesses had been targeted with...

    More
  • Post

    Forget 2-factor, here comes context-aware authentication

    In the past year, we have heard much about two-factor authentication (2FA) a system whereby users need to enter two individual items to log in to a service -- their password and (generally) a randomly generated code supplied from a mobile application or via text message..

    More

CUSTOMERS

REQUEST CALLBACK