IT & ICS Security Services

Assess. Measure. And smartly manage your risk.

Your organisation’s unique risk profile and risk appetite will guide your information security strategy. Find out where your cyber risks are and how to outsmart cybercriminals without breaking the bank.

Ready to protect your business or home?

Get IT & ICS Security services or software from our online marketplace.

Overview

Our IT & ICS Security practice offers the insight, expertise, and best practices that are needed to gain self-sufficiency in IT Security. Our technical experts combine skill and real-world experience that aim to help the entire IT organisation establish and manage programmes to address and reduce risks against Digital Information Security, Availability, Performance, and Compliance. We believe that focused instructions help build competent and dedicated teams with specialised risk management knowledge and skills.

Benefits

Protect your digital information and industrial environments’:

  • Confidentiality
  • Integrity
  • Availability

The true impact of Change Management on project performance

Effective change management allows companies to turn IT projects from potential disasters to success stories. Here’s why.

What’s behind flopping IT governance?

In this article, we explore why IT governance sometimes fails to bridge the gap between what business wants and what IT wants. Do failures point to “bad strategy” or “bad tactics”?

AVeS Cyber Security talks with Radio Laeveld regarding Cyber Security Awareness

Charl Ueckermann, Group CEO, of AVeS Cyber Security, speaks with Radio Laeveld on Cyber Security Awareness – Cyber Criminals Never Sleep.

What is the TransUnion South Africa breach about and how to take action

(Article) 1-min read.
Brazilian hacker group N4aughtysecTU, is demanding R224-million in ransom in the form of bitcoin.

Critical Security Update Required For Exchange Server 2013, 2016 and 2019 (KB5001779)

(Article) 1-min read.
Microsoft released security updates to mitigate significant newly discovered vulnerabilities in Microsoft Exchange 2013, 2016 and 2019.

Critical Microsoft Exchange Server Security Update Required (KB5000871)

(Article) 2-min read.
Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks.

I&T Cost Optimisation: How Governance can help your business survive and thrive in a new 'normal'

Online I&T Governance and Management (and many other) Masterclasses

What is the TransUnion South Africa breach about and how to take action

(Article) 1-min read.
Brazilian hacker group N4aughtysecTU, is demanding R224-million in ransom in the form of bitcoin.

Critical Security Update Required For Exchange Server 2013, 2016 and 2019 (KB5001779)

(Article) 1-min read.
Microsoft released security updates to mitigate significant newly discovered vulnerabilities in Microsoft Exchange 2013, 2016 and 2019.

Critical Microsoft Exchange Server Security Update Required (KB5000871)

(Article) 2-min read.
Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks.

The true impact of Change Management on project performance

Effective change management allows companies to turn IT projects from potential disasters to success stories. Here’s why.

What’s behind flopping IT governance?

In this article, we explore why IT governance sometimes fails to bridge the gap between what business wants and what IT wants. Do failures point to “bad strategy” or “bad tactics”?

AVeS Cyber Security talks with Radio Laeveld regarding Cyber Security Awareness

Charl Ueckermann, Group CEO, of AVeS Cyber Security, speaks with Radio Laeveld on Cyber Security Awareness – Cyber Criminals Never Sleep.

I&T Cost Optimisation: How Governance can help your business survive and thrive in a new 'normal'

Online I&T Governance and Management (and many other) Masterclasses

The true impact of Change Management on project performance

Effective change management allows companies to turn IT projects from potential disasters to success stories. Here’s why.

What’s behind flopping IT governance?

In this article, we explore why IT governance sometimes fails to bridge the gap between what business wants and what IT wants. Do failures point to “bad strategy” or “bad tactics”?

AVeS Cyber Security talks with Radio Laeveld regarding Cyber Security Awareness

Charl Ueckermann, Group CEO, of AVeS Cyber Security, speaks with Radio Laeveld on Cyber Security Awareness – Cyber Criminals Never Sleep.

What is the TransUnion South Africa breach about and how to take action

(Article) 1-min read.
Brazilian hacker group N4aughtysecTU, is demanding R224-million in ransom in the form of bitcoin.

Critical Security Update Required For Exchange Server 2013, 2016 and 2019 (KB5001779)

(Article) 1-min read.
Microsoft released security updates to mitigate significant newly discovered vulnerabilities in Microsoft Exchange 2013, 2016 and 2019.

Critical Microsoft Exchange Server Security Update Required (KB5000871)

(Article) 2-min read.
Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks.

Online I&T Governance and Management (and many other) Masterclasses

Choose Confidence

Get the right Cyber Protection Package for your business with AVeS Cyber Security and Discovery Business Insurance.

Choose Confidence

Get the right Cyber Protection Package for your business with AVeS Cyber Security and Discovery Business Insurance.

Choose Confidence

Get the right Cyber Protection Package for your business with AVeS Cyber Security and Discovery Business Insurance.

We have been dealing with AVeS for a number of years now, and have found them to be one of our best service providers. They are knowledgeable, responsive and thorough in everything they do for us. Nothing is too much trouble, and they attend to our requests promptly.

Wayne H.

IT Manager, Bidvest Buffalo Tapes

A-Team

Meet the people who bring smiles to IT managers’ faces.

A-Team

Meet the people who bring smiles to IT managers’ faces.

IT & ICS Security Sales Request

IT & ICS Security Sales Request

Insert a description of the service(s) you are requesting

Contact Person Details

Please add your work email address and check that it is correct before submitting the form.

Pin It on Pinterest