High quality solutions to realize your goals

The tech expertise that we bring to solve business problems covers:

  • Information security, Information Systems audit, IT Governance
  • Business continuity management
  • Insider threat management and insider frauds investigation
  • Review of IT Policies, processes and procedures to improve efficiency
  • Review of controls/ audit in Forex and Treasury operations
  • Review of controls in Core Banking System (CBS) and other applications to improve integration
  • Review and redesign of reports in CBS and other applications

Please email us (info@truetech.asia) your needs and we will be glad to help you. A couple of instances where we have contributed is briefly described below.

information technology security

Why is comprehensive view of Information Security critical to organizations?

While reviewing the outsourced IT functions at a very large global engineering services corporate, information security was supposedly given due importance. To our utter surprise, it was found that all the admin level user info including passwords, IP addresses, and connection information were stored in an excel sheet. Even worse, the excel sheet was shared with many outsourced staff on laptops that were neither securely configured nor insured. The impact of the combined risks was then highlighted to the IT Top Management and corrective measures implemented forthwith.

Security begins at the top

We had the opportunity to review the IT controls and Info sec functions at a large mining company. Different departments had implemented their own rules for various IT controls, including for length and complexity of passwords. There was no organization-wide standard defined. The first thing that was done was to raise the awareness in Top Management on the importance of laying down policies, and for following standards.

Information Security

  • Designing / reviewing information security policies and procedures
  • Guidance on protecting hardware and software from various threats – physical, technical and non-technical
  • Reviewing information security practices and identifying weak areas for improvement
  • Enhancing the information security posture of client organizations vis-à-vis data availability, integrity, confidentiality and privacy
  • Assessing compliance requirements with standards such as ISO27001
Information Security

Information Systems Audit

  • Review and evaluate compliance with Information security/ risk management policies, Industry standards/guidelines, Compliance requirements, IT Operational policies
  • Examine and assess confidentiality, integrity, reliability and availability of Information and IT resources
  • Examine and assess controls to mitigate process, technology and people risks
  • Examine and assess operating systems, application systems, database management systems and network controls and security
IS Audit

IT Governance to optimize value from investments

  • Whether information systems resources are utilized in an effective and efficient manner
  • Value perception by various stakeholders and end-users
  • Alignment of information systems to operational and strategic needs of business
  • Assess different aspects such as IT plans, project execution, change management and capacity planning
  • Review policies related to retiring of old systems, skills management and continuity management
  • Guidance on appropriate IT governance
IT Governance