Forti5 Technologies (Pvt) Ltd. 

Royal Mail House, Terminus Terrace, Southampton, United Kingdom, SO14 3FD

CONTACT US

To find out more about how Forti5 can help you gain

Cyber Essentials Certification or for GDPR Services 

kindly  contact us by:

Telephone: 02381550005

Email:  contactus@forti5.tech

or fill in the form and we will get right on to it.  

 

© By Forti5 Technologies Pvt Ltd

Compliance Audits

The client completes a self-assessment questionnaire. 

 

Forti5 Technologies uses this questionnaire as a basis for an audit.

 

After the audit, a report is then sent to the client and IASME.

 

If the client is compliant they are issued an IASME Gold certificate along with

badges that can be displayed on their website and all publicity material.

The client may also qualify for the cyber insurance.

Risk Assessment

A risk assessment is at the heart of all information assurance standards.

 

However, no two organisations have the same risk appetite, hence every risk assessment is unique to the organisation.

We will work you to help develop and review your risk assessment.

 

The risk assessment will enable you to make appropriate decisions on where to spend limited resources on solutions you can realistically implement to protected you against the identifies risk and your risk appetite.

Additional Services

  • Monthly support and annual renewal: including regular check-ins  to keep you up to date.

  • Firewall install set up (close ports, rules, etc. plus 2 factor) plus monthly monitoring.

  • Penetration testing of networks.

  • Vulnerability testing websites/apps .

  • Security awareness training 

  • GDPR awareness training  

  • Security Training for managers and technical staff.

  • Help writing policies and procedures Requires a visit to understand the organisation’s dataflow.

  • Help completing Risks Register:        Requires a visit to understand the organisation’s process and vulnerabilities.

  • Help completing the DPIA:     Requires a visit to understand the organisation’s process and vulnerabilities.