IT Aduit & Assessment - Case 1

A cross boarder toy firm with head-office in Hong Kong and factory in China

Size
3000+ Employees

Service
IT Audit and Assessment with Follow-up Services

Challenge
In recent years, with the aggressive growth of China’s economy and businesses, many are struggling to cope with oversea management and security. Our client is no other. An out-dated ERP and a handicapped HR system have cost our client direct money lose. An IT team that are too busy fixing endless users’ daily problems, managers find it almost impossible to communicate and express their business directions and objectives. Internal hacking activities with data and network security issues are present. With a continuous reminder from the news of data leakage and loss, managers have turned to our IT audit and service scheme to evaluate in both technical and business aspects. 

Solution
Identify numerous network security holes and provide technical recommendations. Evaluation of mission critical ERP on technical architectural analysis specifying potential risks and possible automation strategy. Enhance the network control and monitoring with the consolidation of IT management and policies.

Result
With the submission of the management report of our findings, impacts, severity levels and recommendations, a meeting is held with the management team to run through each finding, some includes:
 - Identification of security holes within their multi-sites setup in both network and application aspects.
 - Core business ERP system running a 2-tier hierarchy, any users may delete all system data under a press of the delete button.
 - Insufficient and ineffective configurations of firewall causing managers’ personal desktops and servers vulnerable to hackers.

Follow-up
Reduce potential security holes with an up-to-date centralized monitoring and administration system. Temporary work around method to protect data. Awareness of new options in ERP systems with pertinent professional advice. Establishment of new policies and procedures in protection of the company.

Our team thereafter, proposes a range of IT services providing a one stop solution of our client. Some of our services include:
 •    Immediate handling of high severity objects to minimize risks including firewall configurations and ERP data protection.
 •    In-place a centralized administration and network monitoring systems to govern and simplify IT administration.
 •    Sources different options of ERP’s providing pertinent professional advice.
 •    Establishment of new policies and procedures in protection of the company.
 
Benefit
After the running of our IT Audit and Services Scheme, the workload is centralized and eased by the new establishment of administration and network monitoring systems. The management team has much of a better overview of IT and the current environment in both security and business growth aspects. With the establishment of policies and procedures, a clear guideline is defined and a regular communication channel between management and IT is established.

More Updates

Further reading

𝗪𝗵𝘆 𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗥𝗲𝗺𝗮𝗶𝗻𝘀 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹 𝘁𝗼 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗶𝗻 𝗜𝗦𝗢 𝟮𝟳𝟬𝟬𝟭

𝗪𝗵𝘆 𝗣𝗵𝘆𝘀𝗶𝗰𝗮𝗹 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗥𝗲𝗺𝗮𝗶𝗻𝘀 𝗘𝘀𝘀𝗲𝗻𝘁𝗶𝗮𝗹 𝘁𝗼 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗶𝗻 𝗜𝗦𝗢 𝟮𝟳𝟬𝟬𝟭We spend so much time talking about firewalls, encryption, and phishing simulations — but what happens when someone simply walks into your server room, steals a laptop, and causes damage to company’s assets?Why does physical security matter so much? Because many real incidents start physically:💫 A tailgater slipping into a restricted area and accessing sensitive systems.💫Unlocked desks leaving confidential documents visible to visitors or cleaners.💫Natural disasters such as typhoons and flooding disrupting servers, leading to downtime or hardware damage if environmental protections aren't in place.Physical security directly supports the core principles of information security—the CIA Triad (confidentiality, integrity, and availability) of data and systems. Threats such as theft, tampering, or natural disasters can bypass digital protection entirely.In ISO 27001:2022, physical security is addressed through a dedicated theme under Annex A. Issues like expired fire extinguishers, missing CCTV footage, sticky notes with account passwords, or unlocked server room racks are common findings in an ISO 27001 audit. These are often fixed in a short time but can lead to non-conformities if ignored. Usual physical security practices are as follows:💫 Clear desks and screens (e.g. keep sensitive information in restricted areas)💫Physical entry and access control (e.g. door access restriction)💫Physical Monitoring (e.g. CCTV)💫etc.

𝗛𝗼𝘄 𝗚𝗼𝗼𝗱 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 𝗥𝗲𝗱𝘂𝗰𝗲𝘀 𝗧𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗗𝗲𝗯𝘁 𝗶𝗻 𝗦𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗣𝗿𝗼𝗷𝗲𝗰𝘁𝘀

𝗛𝗼𝘄 𝗚𝗼𝗼𝗱 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 𝗥𝗲𝗱𝘂𝗰𝗲𝘀 𝗧𝗲𝗰𝗵𝗻𝗶𝗰𝗮𝗹 𝗗𝗲𝗯𝘁 𝗶𝗻 𝗦𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗣𝗿𝗼𝗷𝗲𝗰𝘁𝘀Technical debt is often an unavoidable byproduct of rapid development—but good architecture ensures it doesn’t become toxic.1️⃣ Defines Standards and Enforces ComplianceArchitecture sets clear standards for platforms, data, and security, reducing inconsistencies and redundancies. Guidelines and regular architecture reviews ensure new code complies with best practices, preventing unmaintainable implementations from entering the system.2️⃣ Manages Complexity through ModularityModular architecture, such as microservices or well-structured layers, reduces tight coupling and isolates components. This simplifies maintenance, allows teams to work independently, and makes it easier to identify and fix areas of high technical debt before they snowball.3️⃣ Enables Scalability and FlexibilityProactive architectural design anticipates future growth and changing requirements. Systems can scale, adapt to new technologies, and incorporate new functionality without extensive rewrites, minimizing long-term debt and maximizing agility.4️⃣ Improves Maintainability and Reduces RiskClear structure and documentation provide visibility into system dependencies, helping developers understand the impact of changes. Combined with CI/CD pipelines and automated testing, architecture acts as a safety net, allowing incremental improvements while controlling debt accumulation.5️⃣ Aligns Technology with Business GoalsGood architecture ensures systems support business objectives efficiently, balancing speed with quality. It enables sustainable technical choices that maximize ROI while reducing the cost of misaligned or obsolete solutions.In essence: architecture is a strategic investment that turns technical debt from a hidden risk into a manageable, predictable factor—supporting sustainable growth, maintainable code, and long-term innovation.