1. To show you where your staff, processes, and physical security may be lacking.
2. The service includes.
-
Inventory of unsecured computers
-
Reporting computers left unattended and logged in
-
Discovery of sensitive materials left unsecured
-
Attempting unauthorized entry through tailgating or alternate entrances
-
Checking random workstations for security issues
-
Workspace examination for exposed passwords
-
Searching printer, fax and copier areas for confidential material
-
Examining trash bins and dumpsters for improperly discarded information
-
Random social engineering attempts
-
Data analysis
-
Report generation and recommendations
"We are mainly looking enquiries from Kenya & other African Countries."