Services
Our Audit & Assurance services are designed to help you meet every challenge.
-
Legal and voluntary auditing
Discover more
-
International audit
Discover more
-
International financial reporting standards (IFRS)
Discover more
-
IPO e Capital Markets
Discover more
We support your company to grow and compete in the complex economic scenario.
-
Transaction Advisory services
Discover more
-
Recovery and Reorganizations
Discover more
-
Business Consulting
Discover more
-
Business Risk Services
Discover more
-
Cybersecurity Services
Discover more
-
Sustainability
Discover more
-
Insurance
Discover more
We study and develop IT solutions to make your company grow securely and be competitive in the marketplace.
-
IT System Management and Architecture
Discover more
-
Helpdesk level I, II and III
Discover more
-
Software Development
Discover more
-
Cloud solutions for business
Discover more
-
Management Software Consulting
Discover more
Grow with us
Why Grant Thornton?
Training at Grant Thornton
Global Opportunities
It is vital that organisations regularly test their ability to defend themselves against a cyber attack.
We know how emerging cyber threats impact organisations' operations and competitiveness.
Our testing approach introduces security at every stage of the development journey, identifying vulnerabilities early and proactively preventing attacks in every area of the business.
We provide a comprehensive cybersecurity assessment and practical recommendations for remediation activities necessary to eliminate or reduce cybercrime risks. Our tests include:
- Vulnerability Scanning
Fully automated scanning to identify and report the full range of potential weaknesses in your enterprise system; - Penetration Testing
Once the main vulnerabilities have been identified, we proceed with the tests using ethical hacking techniques to identify and report how each weak point can be exploited by attackers; - Web Application Testing
Over half of commercial cyber attacks use flaws in the web applications used by organisations, so it is crucial to test for any weaknesses that could be associated with features such as on-line forms, blogs, forums, etc. - Social Engineering Testing
This type of test is designed to verify employee adherence to the security policies and practices defined by management.
Key factors such as staff preparation and awareness, access to information, compliance with policies, correct data disposal and incident reporting are assessed. - Assessment Report
We carry out a thorough assessment with reports that identify vulnerabilities and provide recommendations and best practices to be implemented to eliminate or mitigate the risk of cyber attacks.