Select a service on the left or contact us directly!
Cybersecurity
We support organisations at every stage of building a secure business
16 years’ experience in business security
Business resilience against digital threats
In 2022, the record-breaking year to date, the average weekly number of attacks on organisations worldwide reached over 1,130. Some 40 million URLs were blocked between July and November 2022 alone (according to Acronis data). Leaked or stolen passwords were responsible for almost half of all the reported breaches in the first half of 2022 alone. The world is experiencing a dynamic escalation in the number, type, direction and method of attacks on organisations and individual users.
How can you protect yourself?
Many businesses are still unaware of the risks involved. There are many reasons for this, including the cost of protective solutions, the low risk awareness among employees and the lack of interest in cybersecurity on the part of owners and management. Such businesses are exposed to severe consequences for failing to take appropriate action. To prevent this, the first step is to identify threats and define security priorities, analysing the risks inherent in the organisation’s processes, systems, and people. The next step is to implement safeguards and monitor the level of risk, while building employee awareness of digital threats remains an ongoing effort.
Outsourcing specialist cybersecurity services can help your organisation navigate this process safely and effectively.
What we are good at
The biggest IT challenges currently facing businesses
NIS 2: the revised EU Directive
The new rules should be applied in all EU member states as of 18 October 2024. The Directive significantly expands the range of entities that are subject to regulation and strengthens their obligations with regard to security and business continuity management, placing particular emphasis on supply chain resilience.
DORA: the new EU regulation
It applies to regulated financial entities and ICT companies that play a key role in the operation of financial markets across the EU. It is expected to come into force in late 2024 or early 2025.
Critical infrastructure protection
Nowadays, everything from light bulbs to boiler controls and power station turbines can be connected to the internet. This, coupled with the current geopolitical situation, means that critical infrastructure is increasingly being targeted by hacking groups, including those linked to national governments. A successful cyberattack on a facility such as a hospital, power station or water supply could jeopardise the stability of the state in a given area.
Cybersecurity talent shortage
Demand for cybersecurity specialists has grown exponentially over the past five years, driven by a rise in hacking attacks and the emergence of regulations around the world (e.g. GDPR, DORA, NIS, CCPA) that force market operators to strengthen the security of their services and data processing. Additionally, specialist training courses and degree programmes are only just emerging.
To date, we have helped ensure the digital security of the following clients:
IT outsourcing and cybersecurity FAQs
-
How can I assess my organisation’s level of cybersecurity?
We tailor the assessment methods and scope based on your organisation’s size, complexity, and cybersecurity maturity. Typically, this includes analysing and evaluating management processes relating to security and IT, as well as conducting systems security and social engineering tests.
-
What does IT systems security testing entail?
IT systems security testing involves simulating a hacking attack to identify vulnerabilities by performing the same actions as a malicious attacker would. Unlike in a real attack, however, all potentially dangerous operations are carried out in consultation with the client and implemented in such a way as to demonstrate the feasibility of the attack without causing any damage.
-
How large is your cybersecurity and IT services team?
Our IT services and cybersecurity management support team consists of over 40 professionals.
-
What is your approach to implementing cybersecurity solutions?
We begin with a cross-sectional analysis to determine the organisation’s cybersecurity status and protection requirements, as well as the available resources. Based on these findings, we propose mitigation measures and help implement them within the organisation.
Why Grant Thornton?
We support our clients at all stages of building a secure business. We know how to make IT security effective and simple. It is not just our job, it is our passion. And that is why we provide the highest level of service.
-
60
people on our team of experts in the fields of IT, security and business continuity
-
300+
clients satisfied with our information security and cyber security support
-
500+
projects delivered across many sectors and for organisations of all sizes