MOT (APK) for your privacy and information security

AVG consultancy -Privacy audit:

- AVG compliance audit using the ICCM methodology
- PMS (Privacy Management System)

ICCM methodology, an introduction:
You must your car inspected annually. Because you are obliged to do so, but also because you want to drive safely. You can easily estimate the risks of driving an unsafe car. But do you ever consider the risks of a poorly secured office environment? For example, how high is the business loss if the computer systems become out of order or business secrets such as customer data or price lists end up on the street? With the ICCM © Audit, the MOT for your office environment, you have a quick insight into the security and privacy risks and you can take measures to cover these risks. With the new AVG, this MOT (part of our AVG Consultancy services) has now become mandatory for most companies, but it is also very useful; on average we find around 75 security leaks per audit! You may be of the opinion that your IT supplier or system administrator must have arranged security properly. How sure are you of this? How clearly are these responsibilities assigned? Unfortunately, Triple-B consultancy finds few situations in which information security is “properly regulated”. Information security is a specialty. Just as the accountant checks the accountant and the MOT(APK) station is the independent inspector for your car, Triple-B consultancy checks the status of information security.
The ICCM © Audit is a simple method to give you a quick insight into your privacy and security risks. Based on the results of the audit, we advise you on adjustments that you can make to cover the risks and make your IT environment safer. The ICCM © Audit is a methodology developed by BSM (Business Security Management). Our business partner in the field of cyber crime and fraud prevention, among other things.

  • et up from the ISO 27000/27001 standard for information security and a self-developed standard system for Privacy.
  • scans quality criteria such as availability for users, confidentiality, integrity and verifiability
    ï benchmarked on the average security level of Dutch companies
  • a practical guide with clear points for improvement methodology with intrinsic quality assurance

The ICCM © Audit is an abbreviation of:
Identify (identify risks) – Close (close risks) – Cross Reference (assurance) – Maintain (maintain and update)
The final report at the ICCM © Audit is a practical guide for you to set up your privacy, infrastructure securely and to make responsible choices from products, solutions and layout.

Example 1:
At a large distribution center, management was convinced that the new wireless network was secure. A check by Triple-B Consultancy showed that wireless and direct access to the product and customer database was possible. The report indicated the weaknesses and the corresponding solutions: with a few minor adjustments, the wireless network was indeed secure.

Example 2
The importance of management information about the information systems is high. The rollout of the improvement plan as a result of the ICCM © Audit, the management had gained insight into the copying behavior of the employees. One employee wanted to take over the files before he resigned. However, the deviant behavior was immediately reported. The employee could immediately hand in the copied data and his laptop.

Quickly safe with the ICCM © Audit!

  • your company data is safe
  • faster systems
  • comply with legislation (AVG)
  • awareness within the company audit costs often recoup quickly.

Privacy management system and standards system, an introduction:
At the annual MOT inspection your car will be checked on the basis of checklists. If defects are found, they will be repaired and your car will be approved. To guarantee that the personal data protection of your company is in order, Triple-B Consultancy passes through a 159 checkpoints (standards) during an audit. More explanation about the standards system used by us and the relationship with management objectives is explained in our page on privacy audits.
Do you want to conduct a Privacy audit / Privacy security audit? Then contact us.
Do you want to know more about internal audits? Then read our page about privacy audits.