To be successful, you have to have your heart in your business, and your business in your heart.
– Thomas Watchon Sr.
IT External Audit
We audit clients’ technology environments (network, applications, and underlying infrastructure) to support the financial statement audits and reporting on internal control over financial reporting. The services provide assurance over:
- IT General Controls;
- Application Controls; and
- New System Implementation and Data Migration.
IT Internal Audit
We work with our clients to achieve their IA objectives through co-sourcing, outsourcing or bespoke models, in line with their business needs.
TKbi helps businesses assess their cyber risk and develop and strengthen their cyber security and resilience. We offer a range of services that help businesses protect themselves from the threat of both external and internal attacks.
Our Cyber Security Services :
– Cyber risk assessments
– Cyber breach readiness assessments
– Data privacy and protection
– Cyber security awareness training
– Incident response Plan
ISO 27001 / ISO 22301
Organizations need to prove they are secure to compete within the global marketplace. In today’s world, it’s not enough to just claim you are secure; potential clients, business partners and board rooms want proof. With TKbi as your trusted partner, achieving and maintaining ISO-27001 certification year over year is a guaranteed reality. Clients who work with us benefit from significantly enhanced security postures and an ability to demonstrate the same to their key stakeholders, including business-critical customers.
ISO 22301:2019 specifies requirements to plan, establish, implement, operate, monitor, review, maintain and continually improve a documented management system to protect against, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.The requirements specified in ISO 22301:2019 are generic and intended to be applicable to all organizations, or parts thereof, regardless of type, size and nature of the organization. The extent of application of these requirements depends on the organization’s operating environment and complexity.
Let Our Experience Be Your Guide
Get Your First Consultation Free
Committed To Helping Our Clients Succeed
Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system’s defenses which attackers could take advantage of.
A vulnerability assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures and providing the organization doing the assessment with the necessary knowledge, awareness and risk background to understand the threats to its environment and react appropriately.
ISO 9001:2015 specifies requirements for a quality management system when an organization: a) needs to demonstrate its ability to consistently provide products and services that meet customer and applicable statutory and regulatory requirements, and b) aims to enhance customer satisfaction through the effective application of the system, including processes for improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements. All the requirements of ISO 9001:2015 are generic and are intended to be applicable to any organization, regardless of its type or size, or the products and services it provides.
ISO 27701 / GDPR
ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001 (ISO/IEC 27701 Security techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management – Requirements and guidelines).