Cyber Security Audits

We analize your cyber security level in order to evaluate the current state of the web pages, computer systems and networks as well as identify vulnerabilities to get rid of them so that information leakage is avoided, so are service interruptions. To accomplish it, we offer you the following audit types:

  • Internal Audits
  • External Audits
  • WiFi Networks Audits
  • Maturity Level Audits
  • Code Audits

Education and awareness

Many cyberattacks are based on social engineering techniques, and it happens that employees and managers may be the weakest link in the security of your company.

One of our main objectives is that employees assume the security of your company's data as another aspect of their work, as well as reinforce the knowledge and practices in cybersecurity of IT personnel:

  • Custom training for your company, in any aspect of security (normative complient, technic). Directed to the personnel with IT responsabilities in the company / agency.
  • Awareness for managers: 2-hour talks explaining the main attacks that a manager can suffer and how to defend themselves.
  • General awareness for the whole company / agency personnel on security matter.

Technology Consulting

As a complement to the Audit, training and regulatory compliance services, we offer technology consulting aimed at implementing organizational and security measures in a structured way that are aligned with internal policies to design good information management practices.

The services offered are:

  • Definition of the information security strategy and master plans
  • Technological solutions implementation projects
  • Implementation of security solutions through different tools


Business consulting for the design, implementation and auditing of regulatory compliance related to information security and business continuity.

  • Information security management systems. ISO 27001 or National Security Scheme (ENS).
  • ISO 22301 business continuity.
  • ISO 27032 cybersecurity management
  • Adaptation to the latest legal requirements (RGPD y LOPDGDD)
  • PCI-DSS Standard.

Expertise and Expert Reports.

Sometimes it is necessary to know or resolve conflicts or frauds of the different types of services, crimes and computer scams. Some of the activities susceptible to percial work are these:

  • Interpretation of IT services contracts.
  • Normative and relation with institutions.
  • Technical reports from any kind.
  • Unfair Employees.
  • Computer attacks.
  • Extortion in social networks.

Custom development of web and mobile applications

We make available to our clients all our experience and knowledge for custom application development, incorporating the latest development and programming technologies to obtain robust software following life cycle techniques, design principles and good practices to prevent and correct defects. before proceeding to the production phase, ensuring its integrity, availability and confidentiality.

  • Custom made development
  • Personalized design
  • Technology innovation
  • Technology for your business
  • Agile methodology
  • Security by default