Security Assessments, Monitoring and Response

All organisations which collect, process and store client data are legally obliged to make sure that it kept secure and away from those who don’t have the right to access it. Unfortunately, IT security is a very complex topic and many organisations are easy prey for skilled criminals.

IXCG has provided IT security services to a number of high profile clients and is well versed in providing assistance to prevent, monitor or deal with the outcome of unauthorised data access.

Security Assessments and audits

Regular security assessments should be part of every organisation’s data protection policy to allow them to assess where they need to improve their procedures, systems and staff training. They are also a common part of due diligence procedures for companies selecting new suppliers.

IXCG is able to perform one off or regular overt of covert penetration tests (also known as ethical hacking) or red team engagements to ensure that your clients’ data is kept safe. We are also able to provide security audits of third party companies which our clients are planning to work with, or who currently working with, as part of a due diligence process.

Security Monitoring

All attempted and actual security breaches leave a trace, whether deliberate or accidental but, with the masses of diagnostic and security data modern systems produce daily, being able to make sense of it can be a challenge.

Whether you need general monitoring of computer systems (including desktops, servers, mobile devices and Point of Sale – PoS – systems), security information and event management (SIEM) or assistance monitoring a specific security system you already have (such as antivirus or firewalls), our dedicated security teams are able to help.


Once suspicious behaviour has been detected, a suitable response should be taken. This could be notifying the target of the malicious behaviour or taking steps to prevent it, such as blocking the attack directly or taking steps to add extra protection to the attacked system.

When we draw up a response agreement, we set specific “rules of engagement” to ensure that the correct people are notified and defence steps are taken, according to your organisation’s needs.