Computer security, also known as cybersecurity or IT security, is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.

You need to be assured that your business systems are always secure, reliable, available and properly controlled. The more dependent businesses do upon computers and the information stored on these devices, the more vulnerable they are to information being made available to unauthorized internal and external parties, accidental deletion of data, and / or deliberate modification of data to hide fraud.

Our security experts can help business and technology managers to address these security risks.

ATS Security Solutions

AT’s security services aim to the entire spectrum of security and can be customized to meet the business specific requirements. We provide a clear framework to evaluate your risks and offer feasible tools and methodologies to assess, control, monitor and measure them.

Review of General IT Controls

• Security policies and procedures.

• Security monitoring – intruder detection and identification.

• Segregation of duties – access to systems by users, administrators and developers.

• Disaster recovery and business continuity planning.

• Physical and environmental controls – locks, air conditioning, water / fire / smoke protection.

Advice on Application Controls

• Control over access, input, modification and deletion of data in applications, for instance accounting software, payroll systems, email systems and other business systems.

Assessment of Network Controls

• Logical access security (Windows 2000, UNIX, etc), remote access, etc.

eCommerce Security

• Vulnerability scanning including firewalls.

• eSecurity attack and penetration / profiling.

• Design and implementation of eSecurity architecture.

IT Internal Audit Services

Teaming and outsourcing of IT internal audit.

“By not identifying or addressing IT risks, you are, in fact, choosing to accept risk”

If you would like to learn more about IT Security and Risk Management or would like to book a demo, please contact


Request a Free Demo