[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][title size=”1″ content_align=”left” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]Cyber Security[/title][fusion_text]It’s an inevitable reality that at some point an organization or business will be impacted by a cyber security breach. With the emergence of new technologies, the cloud and increased access through mobile and social networks, IT, business processes, policies and procedures need to incorporate best practices in order to adapt to continuously evolving cyber threats. The Obscidion Group has a dedicated team specializing in cyber security services designed to meet each client’s requirements.  Each client’s cyber situation is unique, changing as new threats emerge and your business or organization grows. Obscidion’s Cyber Security services employs a pragmatic risk-based approach and provides the following services:

  • Security status health checks
  • Policy and procedure enhancements
  • Vulnerability assessments
  • Penetration testing
  • Breach response planning
  • On-demand Chief Information Security Officer services
  • SOC2 controls advisory and reporting

Assessments can be performed from an external or internal perspective and cover networks, web applications or mobile devices.

Our information security projects include two levels of feedback:

  • Actionable, management and board-ready deliverables
  • Technical recommendations and knowledge transfer

[/fusion_text][/fullwidth]