MOBIUS CREATES SUSTAINABLE CHANGE
IN YOUR ORGANISATION TO ENABLE YOU TO GOVERN AND MANAGE YOUR INFORMATION RISK

CYBER SECURITY

The key to your defence lies not in evasion, but in preparation.

INFORMATION SECURITY

Identify and remediate the underlying problems in your organisation.

INFORMATION PRIVACY

Navigate regulations and drive your own privacy controls sustainably.

DATA GOVERNANCE

Know, manage and protect your data to make informed business decisions.

THIRD PARTY RISK MANAGEMENT

Third Parties often process or have access to your business’ sensitive information

IT GOVERNANCE

Tailored, cost-effective processes to govern and manage your information technology as it grows.

IDENTITY AND ACCESS GOVERNANCE

Simplifying IAG so it can be understood and embraced throughout your organisation.

SECURITY TESTING

Addressing all your challenges from the ground up, so you can be secure and stay secure.

TECHNOLOGY CONSULTING

Getting the most from your technology investment.

READ OUR
LATEST NEWS

ENHANCING INFORMATION SECURITY PROGRAMMES IN MAURITIUS SINCE 2019

With Lovena Reddi, Managing Consultant for Mobius Consulting Mauritius     From South Africa to Mauritius   Mobius Consulting takes pride in empowering the largest group of companies in Mauritius with enhanced Information Security programmes. Mobius Consulting Mauritius, in collaboration with Mobius Consulting South Africa, assisted one of the largest conglomerates in Mauritius to set […]

INTRODUCING LOVENA REDDI

    Lovena Reddi’s Background    After completing her BSC degree in Computer Systems, her next step was to do her Master’s degree in Enterprise Management and later she became a qualified Microsoft Systems Engineer and Certified information Security Manager. She feels as if there is always a lot to learn because the Mobius way of consulting is new on the market.   […]

5 STEPS TO CREATING A CYBER SECURITY INCIDENT RESPONSE FRAMEWORK

With Patrick Ryan, Amanda Hechter and Raymond du Plessis from Mobius Consulting        The NIST Cyber Security Incident Response Framework   Cyber security breaches should be taken as a “when” and not an “if” occurrence, especially given the rise in cyber attacks due to remote working. The wrong time to put your cyber security incident response plan in place is […]