We use cookies to improve your experience. By continuing to use our website, you agree to our privacy policy.

BGIS’ robust cybersecurity strategy

BGIS-Cybersecurity-IT
28 August 2023

Cybersecurity is paramount in protecting our client’s assets from evolving cyber threats and reducing the likelihood of revenue and reputational loss. A strong cybersecurity strategy is a necessity in today’s digital landscape, fostering resilience and a secure environment for operations and stakeholders.

BGIS’ IT department has implemented many cybersecurity initiatives over the last year to protect our client’s assets (both people and digital). The implementation was planned based on a layered defense approach covering concepts including Identify, Protect, Detect, Respond and Recover.

In the Identify phase, assets and vulnerabilities are assessed to understand potential risks. Protect involves implementing security measures and training to safeguard assets. The Detect phase focuses on real-time monitoring to identify threats. In the Respond phase, immediate action is taken to mitigate incidents. Finally, the Recover phase involves restoring systems and conducting post-incident analysis for future improvements.

Below is a summary of BGIS’ ongoing cybersecurity initiatives.

Privileged access management tool strengthens our defenses against unauthorised access to critical systems and sensitive data by managing and monitoring privileged accounts e.g., superusers, database administrator etc. It also minimises the risk of insider threats, providing clients with the confidence that their data remains secure and confidential, with reduced potential for unauthorised access to critical resources.

Data encryption ensures our clients’ sensitive information remains protected and unreadable by unauthorised parties, enhancing the overall security of their stored data. With data-at-rest encryption in place, we offer an extra layer of defense for client data, providing peace of mind knowing that their valuable information is secure even if physical storage devices are compromised.

Ransomware protection employs extra measures to safeguard client’s data from ransomware threats by creating isolated and unalterable offline copies that ensure quick recovery in the event of an attack.

Vulnerability management/Threat intelligence enhances security through proactive vulnerability management, continuously identifying and addressing potential weaknesses in our systems, safeguarding our clients’ data from potential cyber threats. We have also partnered with Australian Cyber Security Centre enabling us to receive timely valuable information to keep informed and secure. It helps us to stay ahead of potential risks and provide insights to protect our interests.

Advanced email analysis and quarantine requires advanced email security tools to analyse incoming emails in real-time and identify malicious or unwanted content. Any identified threats are promptly moved to quarantine after delivery, ensuring that our organisation remains protected from sophisticated email-based attacks.

Application whitelisting restricts unauthorised software and ensures that only trusted applications can run on our systems, bolstering the security of our clients’ data against malicious programs.

Asset Compliance protocols ensure IT assets meet BGIS standards and policy requirements, providing a reliable and compliant infrastructure for business operations.

Security testing program includes regular Penetration Testing, conducted by third party entities to regularly assess and identify potential vulnerabilities in our systems, ensuring continuous improvement of our security measures and providing our clients with a robust and resilient environment.Office physical security ensures a safe and secure environment, safeguarding our clients’ data and maintaining the confidentiality of their business operations.