Cyber Security Requires A Multi-Layered Approach.

AUTHENTICATION

Identify your individuals – create strong and unique usernames and passwords.

AUTHORISATION

Give only certain individuals, based on their identity, access the system.

ENCRYPTION

Convert data or information into code. This will prevent those unauthorised accessing your data.

AUDIT TRAIL

A chronological record providing evidence of activities that have affected a specific event, procedure or operation at any given time.