CYBERSECURITY

________________

“Can I or will I be targeted by a new threat?” aren’t good questions to ask.
You’d better ask yourself “What if I am already targeted?”

SERVICES

After a detailed risk analysis, MIRCA ™ supports your IT Security Manager / CISO through the implementation of an efficient ISS governance, to improve cyber resilience of your IS and to guarantee a better protection of your organisation’s information.

null

GOVERNANCE: INFORMATION SECURITY MANAGEMENT

Based on an overview, set up management system of information security.

null

SECURITY OF THE INFORMATION SYSTEMS (ISS)

Identify and overcome breaches in security of your information system.
Draw up policies, set up security measures, guarantee procedures’ control.

null

DATA LEAK PREVENTION (DLP)

Keep control of your information asset.
Avoid losing control of your sensitive data.

null

PROTECTION AGAINST CYBERATTACKS

What if a massive cyberattack blocked all your servers and computers tomorrow? How should disaster recovery plan look like? What would be priority measures, actions and decisions to start with?

null

CLOUD SECURITY

Address digital transformation in terms of sharing and storing information.
Efficiently manage access to applications in the cloud.

null

EUROPEAN REGULATION: GLOBAL DATA PROTECTION REGULATION

MIRCA has developed a GDPR compliance method: identifying main risks, supporting your teams through risk control, and generating essential evidences.

Solutions adapted to all your needs.

AUDITING

First, MIRCA ™ analyses situation.

Simulating an intrusion, we can identify breaches and vulnerabilities at heart of information site.

Objective of audit is to check if all essential security measures are correctly deployed, controlled, updated, and clearly understood by everyone.

CONSULTING

Based on prior audit, MIRCA ™ offers corrective measures for the sake of your ISS’s governance.

This is why MIRCA ™ also addresses compliance with different standards “ISO 27000 / 27001 / 27002” and regulations.
In other words, we define policy, implementation and control objectives.

TRAINING

MIRCA ™ organises customized training plans for whole staff, so that everyone is aware of issues and good practices regarding cybersecurity.

Training scope goes from emails usage to more specific alerts on new generation frauds and threats.
It is important to keep your staff aware on topics that are constantly evolving.

Get a phone call with one of our experts!