Security and intrusion tests
Security and intrusion tests for public and internal IT/OT/IoT systems; social engineering campaigns; Open Source Intelligence (OSINT) data collection and analysis
Incident investigation and recovery
Investigation of cyber security incidents in cooperation with Latvian and foreign cyber security and law enforcement authorities; incident response
Consulting and outsourcing
Choosing the most effective cyber security solution; security management audit; staff training; outsourcing of security specialist; outsourcing of security management; preparation of information security documentation; rental of security testing solutions
Improving IT management processes of your company/institution
We will work closely with your IT team to help you organise/improve your IT management processes
Developing an IT strategy, IS security strategy, and IT security procedures
We will help you develop your IT and IS security strategies, create the necessary set of internal documents
Company/institution business continuity planning
Continuity planning and optimization of IT-dependent business processes; development of business retaining and disaster recovery procedures
Optimization of company/institution processes
Together with your management team, we will describe your business processes while optimizing/improving them
Monitoring information technology projects
We will act as the customer’s representative in your IT project and oversee your suppliers
Information technology project management
Outsourcing of IT project manager
Outsourcing of IT project manager
We will ensure that the project achieves its objectives and targets within the planned timeframe and budget.
Thanks to our cooperation with IS Services, Spirits & Wine has streamlined its IT processes and now works faster and more efficiently. Janis is the communication bridge between the company management and the IT department. With Jānis’ involvement, communication between departments improved and long-standing projects were resolved.
In 2022, in cooperation with IS Services, we carried out a cybersecurity test including email phishing elements and then conducted a joint user training where we analysed user behaviour in response to these fake emails. Overall, it was this real phishing test that gave the greatest insight into the real threat to users if they carelessly click on links or documents in emails they receive. Users learned to better recognise masked email senders and attachments. IS Services also ensured that our information systems documentation complied with the provisions of Cabinet Regulation No. 442.
We have been cooperating with IS Services since 2011. As a priority cooperation partner and subcontractor, IS Services provides a wide range of IT services to our important clients – IS security-related internal investigations, IT audits, IT service management and control, relevant reports, opinions and consultations.
Services provided by IS Services are professional, systematic, accurate and supported by detailed reports. Both we and our customers value IS Services knowledge, experience and attitude and continue to use their services.