GDPA's Trust Platform: Trust GDPA specializes in offering comprehensive cloud solutions tailored for businesses to navigate the complexities of data privacy compliance. Our platform ensures effective management and protection of personal data, aligning with the latest privacy regulations. We provide round-the-clock monitoring, facilitate the management of privacy policies and notices, and offer training in awareness and security. Our suite of compliance tools is designed to assist businesses in demonstrating their commitment to data privacy responsibilities and in exercising their rights effectively.
Application Whitelisting: A security solution that allows organisations to specify what software is allowed to run on their systems, in order to prevent any non whitelisted processes or applications from running.
Asset Inventory: A list of all IT hardware and devices an entity owns, operates or manages. Such lists are typically used to assess the data being held and security measures in place on all devices.
Custom Threat Intelligence: The collection and analysis of data from open source intelligence (OSINT) and dark web sources to provide organisations with intelligence on cyber threats and cyber threat actors pertinent to them.
Database Encryption: Where sensitive data is encrypted while it is stored in databases. If implemented correctly, this can stop malicious actors from being able to read sensitive data if they gain access to a database.
Data Loss Prevention: Software that can identify if sensitive data is being exfiltrated from a network or computer system.
DDoS Mitigation: Hardware or cloud-based solutions used to filter out malicious traffic associated with a DDoS attack, while allowing legitimate users to continue to access an entity’s website or web-based services.
DMARC: An internet protocol used to combat email spoofing – a technique used by hackers in phishing campaigns.
DNS Filtering: A specific technique to block access to known bad IP addresses by users on your network.
Email Filtering: Software used to scan an organisation’s inbound and outbound email messages and place them into different categories, with the aim of filtering out spam and other malicious content.
Employee Awareness: Training programmes designed to increase employees’ security awareness. For example, programmes can focus on how to identify potential phishing emails.
Endpoint Protection: Software installed on individual computers (endpoints) that uses behavioural and signature-based analysis to identify and stop malware infections.
Incident Response Plan: Action plans for dealing with cyber incidents to help guide an organisation’s decision-making process and return it to a normal operating state as quickly as possible.
Intrusion Detection System: A security solution that monitors activity on computer systems or networks and generates alerts when signs of compromise by malicious actors are detected.
Managed Service Provider: A third-party organisation that provides a range of IT services, including networking, infrastructure and IT security, as well as technical support and IT administration.
Mobile Device Encryption: Encryption involves scrambling data using cryptographic techniques so that it can only be read by someone with a special key. When encryption is enabled, a device’s hard drive will be encrypted while the device is locked, with the user’s passcode or password acting as the special key.
Multi-Factor Authentication: Where a user authenticates themselves through two different means when remotely logging into a computer system or web-based service. Typically a password and a passcode generated by a physical token device or software are used as the two factors.
Network Monitoring: A system, utilising software, hardware or a combination of the two, that constantly monitors an organisation’s network for performance and security issues.
Penetration Tests: Authorized simulated attacks against an organisation to test its cyber security defences. May also be referred to as ethical hacking or red team exercises.
Perimeter Firewalls: Hardware solutions used to control and monitor network traffic between two points according to predefined parameters.
Security Information & Event Management (SIEM): System used to aggregate, correlate and analyse network security information – including messages, logs and alerts – generated by different security solutions across a network.
Vulnerability Scans: Automated tests designed to probe computer systems or networks for the presence of known vulnerabilities that would allow malicious actors to gain access to a system.
Web Application Firewall: Protects web-facing servers and the applications they run from intrusion or malicious use by inspecting and blocking harmful requests and malicious internet traffic.
Web Content Filtering: The filtering of certain web pages or web services that are deemed to pose a potential security threat to an organisation. For example, known malicious websites are typically blocked through some form of web content filtering.