+27 11 475 2407 info@aves.co.za

I&T Governance Services

Assess. Align. And become IT audit-compliant.

See how your IT department can jump into the fast lane by starting with aligning its objectives to business strategic goals and identifying your cyber risks.

Ready to protect your business or home?

Get I&T Governance services or software from our online marketplace.

Overview

Our I&T Governance practice offerings aim to uplift the maturity level of IT departments. We help organisations of all sizes align their IT processes, people and technology to the organisation’s broader business objectives, which in turn cuts wastes in time and money. All our strategies are based on King IV’s IT Governance framework, ITIL, COBIT 2019 and ISO 27001, which provides audit-compliant peace of mind.

Benefits

Turn IT into a machine that is:

  • Ethical
  • Logical
  • Standardised
  • Internationally measurable
  • Audit-compliant

Access control is paramount for effective security of data in the Cloud

Article (3 min read).
Companies are increasingly shifting IT services and applications to the Cloud to be readily available to employees, empowering their productivity from wherever they are and from any device.

Night Talk with Aubrey Masango: Malware

Aubrey Masango from 702 interviews Charl Ueckermann, CEO of AVeS Cyber Security, about malware, what it is, why new variants are set loose on...

Night Talk with Aubrey Masango: Ransomware

(Audio) 26 min listen.
Charl Ueckermann, CEO of AVeS Cyber Security, explains how ransomware attacks work, the vulnerability of networks, individuals and infrastructure as well as the protection thereof from a cyber-attack perspective. Charl also weighs in on Thursday’s attack on Joburg’s City Power, with residents unable to carry out ordinary transactions such as buying pre-paid electricity this week.

MSIL/Samas.A Threat Notice

(Article)
SAMSAM (Version 4), also known as MSIL/Samas.A, is a ransomware strain that shares analyses of vulnerabilities on the dark web that cyber actors then use to deploy the ransomware on a network.

Worldwide ransomware attack infects users in over 100 countries

(Article)
#Ransomware featured in the top news this weekend when the exploit-encryptor-worm WannaCrypt (nicknamed #WannaCry) spread across the world by piggy-backing off the Windows exploit #EternalBlue. Researchers in our security network reported that around 100,000 users saw their computers encrypted in a matter of minutes over the last 72 hours.

The CIO/IT Manager Enablement Workshop

22-24 October 2019, Johannesburg
*Seats are limited*

MSIL/Samas.A Threat Notice

(Article)
SAMSAM (Version 4), also known as MSIL/Samas.A, is a ransomware strain that shares analyses of vulnerabilities on the dark web that cyber actors then use to deploy the ransomware on a network.

Worldwide ransomware attack infects users in over 100 countries

(Article)
#Ransomware featured in the top news this weekend when the exploit-encryptor-worm WannaCrypt (nicknamed #WannaCry) spread across the world by piggy-backing off the Windows exploit #EternalBlue. Researchers in our security network reported that around 100,000 users saw their computers encrypted in a matter of minutes over the last 72 hours.

Access control is paramount for effective security of data in the Cloud

Article (3 min read).
Companies are increasingly shifting IT services and applications to the Cloud to be readily available to employees, empowering their productivity from wherever they are and from any device.

Night Talk with Aubrey Masango: Malware

Aubrey Masango from 702 interviews Charl Ueckermann, CEO of AVeS Cyber Security, about malware, what it is, why new variants are set loose on...

Night Talk with Aubrey Masango: Ransomware

(Audio) 26 min listen.
Charl Ueckermann, CEO of AVeS Cyber Security, explains how ransomware attacks work, the vulnerability of networks, individuals and infrastructure as well as the protection thereof from a cyber-attack perspective. Charl also weighs in on Thursday’s attack on Joburg’s City Power, with residents unable to carry out ordinary transactions such as buying pre-paid electricity this week.

The CIO/IT Manager Enablement Workshop

22-24 October 2019, Johannesburg
*Seats are limited*

Access control is paramount for effective security of data in the Cloud

Article (3 min read).
Companies are increasingly shifting IT services and applications to the Cloud to be readily available to employees, empowering their productivity from wherever they are and from any device.

Night Talk with Aubrey Masango: Malware

Aubrey Masango from 702 interviews Charl Ueckermann, CEO of AVeS Cyber Security, about malware, what it is, why new variants are set loose on the Internet every second of the day, and how...

Night Talk with Aubrey Masango: Ransomware

(Audio) 26 min listen.
Charl Ueckermann, CEO of AVeS Cyber Security, explains how ransomware attacks work, the vulnerability of networks, individuals and infrastructure as well as the protection thereof from a cyber-attack perspective. Charl also weighs in on Thursday’s attack on Joburg’s City Power, with residents unable to carry out ordinary transactions such as buying pre-paid electricity this week.

MSIL/Samas.A Threat Notice

(Article)
SAMSAM (Version 4), also known as MSIL/Samas.A, is a ransomware strain that shares analyses of vulnerabilities on the dark web that cyber actors then use to deploy the ransomware on a network.

Worldwide ransomware attack infects users in over 100 countries

(Article)
#Ransomware featured in the top news this weekend when the exploit-encryptor-worm WannaCrypt (nicknamed #WannaCry) spread across the world by piggy-backing off the Windows exploit #EternalBlue. Researchers in our security network reported that around 100,000 users saw their computers encrypted in a matter of minutes over the last 72 hours.

The CIO/IT Manager Enablement Workshop

22-24 October 2019, Johannesburg
*Seats are limited*

The AVeS Team has been instrumental in the review and update of our ICT policies and procedures. Their combination of skills and experience makes the partnership with AVeS Cyber Security a good one for the IT department at Palabora.

Wendy M.

IS&T Manager, Palabora Mining Company

A-Team

Meet the people who make our clients’ governance worlds go round.

A-Team

Meet the people who make our clients’ governance worlds go round.

I&T Governance Sales Request

I&T Governance Sales Request

Insert a description of the service(s) you are requesting

Contact Person Details

Please add your work email address and check that it is correct before submitting the form.

Pin It on Pinterest