Ensuring MNB compliance of financial institutions

Technology Audits/ Vulnerability investigation 

Information Technology Audit

For all the opportunities technology brings to companies, it can bring just as many risks – especially for companies that are growing rapidly. Technology risk forms a critical component of an organisation’s risk profile but can often be overlooked or given insufficient attention. This is sometimes due to a lack of understanding of technology risk, or that technology risk remains outside of the more traditional risk themes often recorded in organisation risk registers. With the proliferation of complex technologies in many organisations, proactive management of technology risk should be considered a priority.

 

The world is changing, and technology will reshape our lives over the coming years, whether digitalisation, advanced data analytics, cloud or robotics change will touch many aspects of life and business. The benefits of transformation are becoming increasingly evident. We believe Boards and Senior Management will need to respond to this change in a multitude of ways, with one vector being the quality of the Technology Risk and Assurance insight and ‎capabilities available to them. At BDO, we continue to innovate and invest, so that our clients have access to the latest advice and assurance over the key risks areas. 

BDO has significant experience of guiding organisations on managing risks - from the review of infrastructure, applications, and systems, to providing guidance on how to set up an effective process for IT governance which can be quickly embedded in an existing organisation risk management framework. BDO’s dedicated professionals provide our clients with a range of Technology advisory and audit services to contain risk, minimise downtimes, comply with complex government regulations and help the company run more efficiently. We value our client relationships and take pride in helping them tackle their biggest challenges – whether they’re expected or unexpected.

 

Vulnerability 

Test how vulnerable you are to social manipulation and phishing 

We offer a range of security tests that use social manipulation to uncover human vulnerabilities, and thus reduce the likelihood of employees being lured into doing things that may pose a security risk to the company, including:

 

  • Phishing campaign – increase the ability of employees to identify and handle malicious e-mails through a combination of e-learning modules and fictitious phishing e-mails 
  • Phishing exercise – receive a fictitious phishing e-mail to test how many in your company can be tricked into clicking on malicious links and open attachments 
  • Physical penetration test – test whether unauthorized persons can access your company’s premises and plant software that allows for remote control of endpoints and IT systems 

Get started with improving your IT security – order a preliminary vulnerability scan! Security testing is important to detect security gaps and vulnerabilities. But what kind of test is appropriate for your company? 

If you are unsure of which security needs your company has, we recommend starting with a single technical vulnerability scan. After the scan, you will receive a detailed report with findings and specific recommendations that will provide a good basis for any further testing and security measures. 

We provide both vulnerability assessments and penetration testing services to help you  assess your extent of IT security vulnerability or possibility of attacks originating  from outside and within your private network as well as ascertain the extent to which such vulnerabilities can be exploited.

 

Security awareness education 

The technical security measures of organisations are rapidly increasing alongside technology. Cybercriminals have therefore resorted to attacking the weakest link within the organisation: the employees. The human component is a highly interesting way in for cybercriminals. Research reveals that in a large number of successful data leaks or cyber theft, it was employees who subconsciously or unintentionally provided access to a hacker.

 

Have you, or your employees, ever considered the dangers of email, text messages, invoice and/or CEO fraud, social media, weak passwords, unsecured cameras, free WiFi or others? 

The “Security Awareness” training focuses on the above topics and much more, and provides a ‘behind the scenes’ look at what cybercriminals are doing today to trap you, or your employees.

 

Security Operation Center 

Meet the new standard of transparency   

Business success is built on trust and transparency. 

It’s increasingly common for customers and stakeholders to expect System and Organization Controls (SOC) reports to demonstrate the strength of a company’s internal controls. A growing requirement, SOC reports can also give you an edge over your competition by offering transparency into your business’s processes and controls.   

We have extensive experience across the full spectrum of SOC reporting. Our highly responsive team of seasoned professionals work quickly to address your questions while comprehensively testing your internal controls. With the resulting report, you’ll build confidence in your control environment with your customers, stakeholders and potential investors.

 

 

 

.

Krisztián Valter

Digital I Managing Director, ISO27001 chief auditor
View bio
Vadász Gábor

Gábor Vadász

Digital | Chief Technology Officer
View bio