Cyber security is the continuous process of protecting and securing digital data, networks and computing devices against breach of their confidentiality or any misuse by external cyber attacks or any other threats. Did you know that research shows that hackers attack every 39 seconds for an average of 2,244 times a day? Today, it’s not a question of if but when a data breach will occur. This is why it is critical to put in place the best IT practises to secure your infrastructure. These best practices contain hundreds of components. At Kolibri, we regroup them under 8 major areas of cyber security.



Framework and standards

Establishing a framework specific to your industry, provides guidelines and standards to protect your company against possible cyber attacks. Various industries are required to enforce different standards and requirements in order to properly operate. For example, some manufacturers needs be CGP certified or the medical industry must be PIPEDA-compliant. In a nutshell, to implement a framework, it is important to analyze:

  1. The company’s goals and policies
  2. The maturity of current cyber risk security program.
  3. The different regulations and standards the company needs to comply with.


Risk assessment

The purpose of Security risk assessment is to have a clear view and understanding of the security risk the company could face, so the cybersecurity choices it should make and focus on. The company should identify, analyse and evaluate risk to make sure the cyber security measures are appropriate to the risk the organization could face. A risk assessment process should include, but not exclusively:

  1. Vulnerability Scan
  2. 3rd party risk
  3. Assets inventory
  4. Penetration test
  5. Data centric risk assessment
  6. Source code scan


Security architecture

The proper design of your cyber security architecture is as critical as it gets. It is divided in the three different parts:

  1. What are the best hardware and software for a secure computer system.
  2. What is needed to keep the system secure?
  3. Which analysis model to use to asses if the system is really secure?


A well-designed security architecture should include components such as:

  1. Access control
  2. Network Design
  3. Data protection
  4. Cloud security
  5. Cryptography
  6. Secure system builds
  7. Many more…


Security operation

Cyber security can often give a few headaches. You walk a fine line between making sure the users have access to the tools they need to do their jobs, while trying to maximize the network security. The security operation domain is responsible for the day-to-day access and the security of resources. It is the process of putting in place the right policies, standards and procedures that will ensure the security of all systems while the business operates as normally as possible.


User training and education

User training and awareness is a critical component for ensuring a robust cyber security posture. While there are numerous malware attack methods, social engineering tactics remain to be the most pervasive. Social engineering attacks like phishing are widespread because they seek to exploit human weaknesses and require minimal resources or expertise to execute. Human hacking methods often register a high success rate; hence it is essential to train users to identify and avoid them.

Training employees on identifying, reporting, and blocking suspicious senders can enable your organization to avoid most attacks that depend on a social engineering attack’s success. It is vital to train users on the tell-tale signs of human hacking techniques and best practices for avoiding them.



While the IT Security management focus on making decisions to mitigate risks; governance is concerned with who is authorized to make decisions. Governance determines the framework of accountability and grants oversight to make sure risks are appropriately diminished. Management advises cyber security strategies while governance ensures that those strategies are coherent with regulations and match the organization objectives. Governance shall consider important components such as:

  1. Audits
  2. Laws and Regulations
  3. Executive Management Involvement
  4. Written Supervisory Procedures (WSPs)


Threat intelligence

Securing your network should always be a priority. Since cyber security is a continuous process, businesses must keep an eye on ways to improve their IT security. Threat Intelligence is interested in collecting, processing and analyzing data in order to better understand the attack behaviours, targets and motives of cyber attackers. It is evidence-based information about current and emerging threats. This process will help organizations to make quicker, informed and data-oriented decisions while becoming a more proactive business regarding cyber security.


Physical security

Rightfully so, businesses invest more than ever into cyber security. However, organizations still have to make sure their important physical assets, employees and properties are secured. While not all companies need security guards or sophisticated Artificial Intelligence systems, they must have the proper physical defences against possible threats and intrusions. A well-thought surveillance system and the implementation of access control for buildings, office sections and/or specific rooms with keypads, ID cards or biometrically restricted doors is an example of easy procedures that could help secure your business.

courbe_pourquoiChoisir Created with Sketch.

Why choose us ?


We understand the reality of SME


We can fulfill the majority of your technological needs.


We are available when it counts