My Sourcing

    Please enter a valid keyword with 2 or more characters / numbers.

    UCS Hong Kong Ltd
    Enquire
    ICTS - Information & Communications Technology Security
    Share this page
    Description
    Contact Supplier
    Description
    Risk Assessment
    • Identify risks & vulnerabilities
    • Conduct log analysis and penetration tests
    Security Policy Formulation & Review
    • Ensure adequate rules & procedures
    • Make provision of resources
    • Define roles & responsibilities
    Security Audit
    • Determine conformity to security policies & regulatory compliance
    Security Incident Investigation
    • Evaluate adequacy of existing security measures
    • Seek continuous improvement initiatives
    • Identify who should be held responsible, and to what extent
    Data Recovery & Computer Forensics
    • Recover critical data
    • Ensure business continuity
    • Act as expert witness in court
    Staff Awareness Training
    • Mitigate non-malicious attack by staff due to ignorance or carelessness
    Continuous Consultancy Services
    • Allow informed and independent business decision in acquisition of infrastructure
    • Keep track of ever-changing IT phenomenon and its security landscape
    • Provide comprehensive services by a team of specialists with a detective mindset and expertise

    UCS Hong Kong Ltd

    UCS Hong Kong Ltd

    Hong Kong

    Service Company

    You may also like

    Unfollow this supplier?