Corporate Trainings
-
26
Jul 2022Day Long Workshop on FINANCE ACT 2022-23 Under Income Tax & Federal, Provincial Sales Tax Laws
Centric Consulting in collboration with Softax has organized a Day Long Workshop on FINANCE ACT 2022-23 Under Income Tax & Federal, Provincia... -
17
Mar 2022Mastering the skills of INTERNAL AUDIT REPORT WRITING
ONE DAY TRAINING on Mastering the skills of INTERNAL AUDIT REPORT WRITING Learning Objectives: • Analyse the typical audit report st... -
07
Aug 2019Workshop on Withholding Tax
Centric Consulting organised A day long Workshop on Withholding Tax in Federal and Other Provinces under Income Tax Laws and Sales Tax Act. To be...
IT Solutions
QuickBooks Consulting
Sage ACCPAC Consulting
SAP Consulting
What We Offer
Information System Audit
Information Technology (IT) is a Strategic Asset and Critical Enabler for any organization to deliver integrated and easily accessible information to its management and staff regarding its operations, while ensuring that internal administrative operations are managed efficiently and effectively. As per the international standards defined by ISACA, IT Security as the \\\"safeguards\\\" to preserve the confidentiality, integrity, availability, intended use and value of electronically stored, processed or transmitted information.
Objective
The objective of the audit is to assess the organization compliance with the assurance on the Management of Information Technology and focusing on IT risk aspects and requirements. This included assurance that internal controls over the management of IT security were adequate and effective.
Centric Consulting offers to review following key areas but not limited to:
- Physical and Environmental Review
- System Administration Review
- Application Software Review
- Network Security Review
- Business Continuity Review
- Data Integrity Review
Our Approach
At Centric Consulting, we adopt a risk based approach to give our expert assesment after evaluating the following key areas of an organization:
- Evaluate IT Governance
- Evaluate IT processes to identify risk
- Conduct a risk assessment and identify risk exposures that threaten;
- Data integrity
- Data security
- Continuity of operations
- Regulatory compliance
- Level/types of access assigned to users and technical staff and customer service
- Evaluate IT Infrastructure
- Evaluate the use of computer hardware and software
- Physical Environment
- Information System Security
- Network Security
- Application Security
- 3rd Party Service Security
- Evaluation of data recovery process
- Evaluate the use of computer hardware and software
- Evaluate IT Procurement
- Change Management Review
- Business Continuity Review
- Disaster Recovery and Incident Management
For more information, Contact Us by providing brief information about your requirements in an online inquiry form or you can call us at: +92-51-2605672-74
Fraud Solutions
As the effects of the recession continue to bite, fraud is increasing. Attention therefore needs to be focused on protecting finances, assets and reputations. Reducing fraud losses and other financial harm to an absolute minimum is crucial if one is survive the storm. Equally, if you are in a public sector organization reducing losses to fraud can help you sustain levels of service at a time of cuts in public spending.
We provide proactive and reactive solutions to your most difficult “problems”, whatever they may be. Our Fraud Solutions team can help you to save your organization money and protect its reputation, whether you are in the public or private sector. The impact of fraud and related crime can include:
- Financial loss, which could have a catastrophic impact on the business
- Compliance and regulatory infringements
- Breaches of civil law resulting in litigation and damages paid to injured parties
- Instigation of criminal proceedings
- Damaging publicity
- Loss of funds
Accounting and Bookkeeping
Our goal is to assist small-to-medium size businesses with their financial accounting and bookkeeping needs. Our services allow organizations to focus on generating additional revenue and core business functions while allowing us to handle the administrative and back-office duties and responsibilities of entering receipts, reconciling accounts and performing month-end financial closings.
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment
We analyse and understand security risks to your business by performing comprehensive and managed vulnerability assessment.
Cyber security is constantly changing and new threats and vulnerabilities against businesses emerge every day. One way to secure company assets, maintain an awareness of the vulnerabilities in your environment and respond quickly to mitigate potential threats is through a regular vulnerability assessment.
A comprehensive vulnerability assessment provides organisations with the knowledge, awareness and risk background necessary to understand threats to their environment. Remediation measures can then be applied accordingly. Identifying risks before hackers do will drastically improve the cyber security posture of your business.
What is a vulnerability assessment?
Centric Consulting’s Vulnerability Assessment service helps to identify, quantify and address the security vulnerabilities that exist within your company’s infrastructure, including on-premise and cloud networks. Our cyber security professionals integrate advanced scanning technology into all vulnerability assessments, providing a high level of support required to address identifiable vulnerabilities.
What we assess
Centric Consulting's Vulnerability Assessment utilises advanced scanning software to detect live risks to your company’s infrastructure, identifying new internal and external vulnerabilities, preventing unauthorised access. Our qualified IT experts review the results of the vulnerability scans to provide a report, outlining key recommendations and threat remediation advice.
We test against the world’s largest integrated public database of exploits and provides the following benefits:
- Identification of systems and processes that pose a security risk before attackers identify them.
- Inventory creation of all devices on a business network, including system information.
- Defined level of risk that exists on the network.
- Inventory of all devices within the business to assist with future upgrades and future vulnerability assessments.
Penetration Testing
Preparing your business IT systems and infrastructure against any cyber attack is highly reccommended.
We’ll strengthen your network against cyber-attacks with our penetration testing services. Using ethical hacking techniques, real-world cyber-attacks are simulated through internal and external penetration tests to identify any cyber security weaknesses. We’ll expose your security vulnerabilities before hackers exploit them.
Any vulnerabilities that are identified by our team will have remediation techniques applied immediately to secure your IT infrastructure. Extensive reporting is provided, including executive summaries and detailed technical recommendations to enhance the level of existing security within your organisation’s networks.
What is Penetration Testing?
Penetration testing (also known as a ‘pentesting’) is an ethical hacking process designed to assess computer systems, networks and applications. This is with the aim of testing the ability of your systems to withstand a sustained cyber-attack and identify and address security vulnerabilities that could be exploited by cybercriminals.
Penetration Testing Services
- Network testing
- Web application security testing
- Wireless network testing
- Mobile security testing
- Physical Devices
- Firewall configuration review
- Host configuration review