Integrated Approach

Uniquely specializing in all areas
of information security

What is an Integrated Approach?

The "Integrated Information Security" approach is a qualitative exercise that focuses on identifying the client's vulnerabilities with the five components of integrated Information Security:

Governance and Corporate Culture

  • Does your organization manage Information Security like your other corporate priorities?
  • Do you have an organizational information security policy in place to guide how information is managed and protected?

Physical and Personnel Security

  • Do you have the required policies and processes in place to ensure your human resources and infrastructure operate in a manner that takes into account the importance of information security?
  • Do employees understand that sound information security practices are a clear expectation of their work performance?

Non-IT Information

  • Is it clear to all staff and management how effectively handle, store and share sensitive non-IT information and do they have access to sufficient storage equipment to protect this information?
  • Does your organization have clear procedures to manage (store, log, track, dispose) information contained on portable storage devices such as memory sticks?

Emergency Management and Business Continuity

  • Do you have plans in place to prepare your organization for information security-related situations such as an information breach of private data in order to limit business impacts, protect your clients, and meet legislation requirements?
  • Are you clear on what regulatory bodies need to be immediately notified in the event of a data/privacy breach?

IT and Cyber Security

  • Does your organization have robust cyber security controls in place?
  • Does your organization conduct regular reviews of your IT assets to discover security vulnerabilities, and upon discovery assign proper severity to trigger remediation actions?
  • Does your organization have a proper program in place to manage third-party security risks?
Unite Interactive