Legal and Ethical Obligations for Cybersecurity
Our Approach

We recognize that your Board of Directors has both legal and ethical responsibilities to safeguard your company's data and your customers' sensitive information from potential compromise. These responsibilities are dictated by various regulations, including the ICT Act, Data Protection Act, Cybersecurity and Cybercrime Act, and Electronic Transaction Act, and in some cases, regulations from the Bank of Mauritius and the Financial Services Commission.

Given that compromission entails data loss and breaches of Confidentiality, Integrity, or Availability (CIA), we acknowledge the utmost significance of upholding a robust security stance to protect your valuable assets, sensitive data, and ensure regulatory compliance across your Information System ecosystem.


Router, Switch, Wifi, Firewall

Evaluate   the   network nodes  effectiveness  in terms  of  prevention  of unauthorized access and potential intrusions.

Information System

Apps, Cloud, Database

Assess the security posture of end-user devices configurations and protection.


Policies, Frameworks

Review the existing security controls and alignment with the law. Regulatory obligations and the industry best practices.

Analysis & KPI

Cybersecurity Dashboard

Conduct a thorough vulnerability audit to identify weaknesses to providing advices for remediation.


Value for Money

The program is tailored and optimized to meet the specific needs of your organization.

We provide assistance, comfort and expertise

Our team of experts adhere to industry-leading standards, best practices, and proven frameworks, with a particular focus on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) to assess your organization's capabilities in these critical areas :

  • Identify Cybersecurity Threats
  • Protect from Cyber Intrusions
  • Response Analysis and Mitigation
  • Detect Potential Compromission
Our Services


Cyber Health Diagnostic

  • Overview of Cybersecurity posture
  • Efficient self- assessment and evaluation
  • Automated Reporting



Cybersecurity Audit

  • Organization security
  • Physical security
  • Network security
  • IT security


Framework Deployment

  • Identification of IT and Cybersecurity gaps
  • Analysis and recommendations
  • Establish and monitor remediation plan
  • Implement ISO 27001 and ISO 27002
  • Perform regular Penetration testing
  • Review and update plan

Vigilant Guard

IT General Control

  • IT Governance & Management
  • Data Management
  • Business Continuity Planning
  • Information Security
  • Change Management
  • Outsourcing of IT infrastructure


End-User Training

  • Educate users to protect information assets
  • Objectives : Comprehensive program with practice
  • Theory and practical sessions with laptops
  • Course immediately actionable in personal life