{"id":356,"date":"2017-09-01T15:31:14","date_gmt":"2017-09-01T10:01:14","guid":{"rendered":"https:\/\/moditech.ca\/?page_id=356"},"modified":"2017-10-07T16:22:30","modified_gmt":"2017-10-07T10:52:30","slug":"it-security-audits","status":"publish","type":"page","link":"https:\/\/moditech.ca\/?page_id=356","title":{"rendered":"IT Security Audits"},"content":{"rendered":"<p><section data-kc-fullwidth=\"row\" class=\"kc-elm kc-css-751739 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-823460 kc_col-sm-7 kc_column kc_col-sm-7\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-908167 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system access controls, and analyzing physical access to the systems. Automated assessments, or CAAT&#8217;s, include system generated audit reports or using software to monitor and report changes to files and settings on a system. Systems can include personal computers, servers, mainframes, network routers, switches.<\/p>\n<p>\n<\/div>\n<div class=\"kc-elm kc-css-999135 kc-animated kc-animate-eff-fadeInLeft kc-call-to-action kc-cta-2 kc-is-button\">\n\n\t<div class=\"kc-cta-button\"><a href=\"https:\/\/moditech.ca\/contact\/\">Request a Callback <span class=\"kc-cta-icon\"><i class=\"fa-phone\"><\/i><\/span><\/a><\/div>\n<\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-31589 kc_col-sm-5 kc_column kc_col-sm-5\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-526614 kc-animated kc-animate-eff-fadeInRight kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/moditech.ca\/wp-content\/uploads\/2017\/09\/it-security1-small.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><\/div><\/div><\/section><section data-kc-fullwidth=\"row\" class=\"kc-elm kc-css-430468 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-857616 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-840872 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p style=\"text-align: center;\">An IT\u00a0<b>audit<\/b>\u00a0is the examination and evaluation of an organization&#8217;s information technology infrastructure, policies and operations. Information technology\u00a0<b>audits\u00a0<\/b>determine whether IT controls protect corporate assets, ensure data integrity and are aligned with the business&#8217;s overall goals.<\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-24846 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-466337 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-682034 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">What is cyber audit?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-755246 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>IT auditing and cyber security. IT is a broad term that is concerned with managing and processing information. It affects an organisation&#8217;s strategy, structure, marketing and operations. Areas encompassed by IT that relate to internal audit include: IT governance.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-130264 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-432641 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">What is a security audit in information security?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-994970 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>A security audit is a systematic evaluation of the security of a company&#8217;s information system by measuring how well it conforms to a set of established criteria.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-177131 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-62882 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-970538 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">What is a network audit?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-245972 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>Network auditing is a process in which your network is mapped both in terms of software and hardware. The process can be daunting if done manually, but luckily some tools can help automate a large part of the process. The administrator needs to know what machines and devices are connected to the network.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-416229 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-786249 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">What is cyber assurance?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-109964 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>Cyber assurance is the justified confidence that networked systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents, and unexpected events.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-762180 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-813416 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\"><div class=\"kc-elm kc-css-232363 kc-animated kc-animate-eff-fadeInLeft kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/moditech.ca\/wp-content\/uploads\/2017\/09\/Security-Audit.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-810176 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-634377 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">What is the purpose of an IT audit?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-468342 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization&#8217;s information. Specifically, information technology audits are used to evaluate the organization&#8217;s ability to protect its information assets and to properly dispense information to authorized parties.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-505514 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-433940 kc_col-sm-12 kc_column_inner kc_col-sm-12\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-489627 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">Moditech IT security audit services include reviews of:<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-513869 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<ul>\n<li>Authentication and access controls<\/li>\n<li>Network security<\/li>\n<li>Host security<\/li>\n<li>User equipment security (e.g., workstation, laptop, handheld)<\/li>\n<li>Personnel security<\/li>\n<li>Physical security<\/li>\n<li>Application security<\/li>\n<li>Software development and acquisition<\/li>\n<li>Business continuity \u2013 security<\/li>\n<li>Service provider oversight \u2013 security<\/li>\n<li>Encryption<\/li>\n<li>Data security<\/li>\n<li>Security monitoring<\/li>\n<\/ul>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":4,"featured_media":826,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-356","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/moditech.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=356"}],"version-history":[{"count":8,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":933,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages\/356\/revisions\/933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/media\/826"}],"wp:attachment":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}