Zephyr's Security
Zephyr's Cyber Security Governance and Approach:
At Zephyr, we prioritise the security and integrity of our digital assets and customer data. Our comprehensive cyber security governance framework is designed to protect our IT infrastructure, ensure compliance with regulatory requirements, and foster a culture of security awareness across the organisation. Our approach is based on the CIS-8 Framework, which includes the following key components:
1. Know the IT Assets: We maintain an up-to-date inventory of all IT assets, including hardware, software, and third-party applications. This allows us to manage and protect our digital environment effectively.
2. Protect IT Assets: We implement robust security measures to safeguard our IT assets. This includes the use of Antivirus, RMM Monitoring, Firewalls, and a Zero-Trust Approach to ensure that only authorised users have access to critical systems.
3. Prepare Your Organisation: We conduct regular cyber security audits, develop and enforce security governance policies, and create business continuity plans to ensure our organisation is prepared to respond to security incidents. Additionally, we perform penetration testing to identify and address potential vulnerabilities. Furthermore, we are audited annually by a third-party cybersecurity expert.