27 TP


Ambitiously supporting your growth
Get in touch with our team.

Legal and Ethical Obligations for Cybersecurity

Our approach

We recognize that your Board of Directors has both legal and ethical responsibilities to safeguard your company's data and your customers' sensitive information from potential compromise. These responsibilities are dictated by various regulations, including the ICT Act, Data Protection Act, Cybersecurity and Cybercrime Act, and Electronic Transaction Act, and in some cases, regulations from the Bank of Mauritius and the Financial Services Commission.

Given that compromission entails data loss and breaches of Confidentiality, Integrity, or Availability (CIA), we acknowledge the utmost significance of upholding a robust security stance to protect your valuable assets, sensitive data, and ensure regulatory compliance across your Information System ecosystem.


  • Router, Switch, Wifi, Firewall
  • Evaluate the network nodes effectiveness in terms of prevention of unauthorized access and potential intrusions.

Information system

  • Apps, Cloud, Database
  • Assess the security posture of end-user devices configurations and protection.


  • Policies, Frameworks
  • Review the existing security controls and alignment with the law. Regulatory obligations and the industry best practices.

Analysis & KPI

  • Cybersecurity dashboard
  • Conduct a thorough vulnerability audit to identify weaknesses to providing advices for remediation.


  • Value for Money
  • The program is tailored and optimized to meet the specific needs of your organization.

We provide assistance, comfort and expertise

Our team of experts adhere to industry-leading standards, best practices, and proven frameworks, with a particular focus on the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) to assess your organization's capabilities in these critical areas :

  • Identify Cybersecurity Threats
  • Protect from Cyber Intrusions
  • Response Analysis and Mitigation
  • Detect Potential Compromission

Our Services


Cyber Health Diagnostic

  • Overview of Cybersecurity posture
  • Efficient self- assessment and evaluation
  • Automated Reporting


Cybersecurity Audit

  • Organization security
  • Physical security
  • Network security
  • IT security


Framework Deployment

  • Identification of IT and Cybersecurity gaps
  • Analysis and recommendations
  • Establish and monitor remediation plan
  • Implement ISO 27001 and ISO 27002
  • Perform regular Penetration testing
  • Review and update plan

Vigilant Guard

IT General Control

  • IT Governance & Management
  • Data Management
  • Business Continuity Planning
  • Information Security
  • Change Management
  • Outsourcing of IT infrastructure


End-User Training

  • Educate users to protect information assets
  • Objectives : Comprehensive program with practice
  • Theory and practical sessions with laptops
  • Course immediately actionable in personal life
People-centered support
Reach out to our experts
Contact us