WE OFFER ENTERPRISE-WIDE IT CONSULTING SERVICES TO BUSINESSES

About Us

Keeping up with the latest technology is very important in today’s times and that is what we assist companies in the SME market space with. Internally we do research to keep up with the latest technology that will assist us to improve our client’s infrastructure and keep them up to date with the latest best practice solutions.

BEST OF OUR SERVICES

POPI COMPLIANCE

The Protection of Personal Information Act (or POPI Act) is South Africa's equivalent of the EU GDPR. It sets some conditions for responsible parties (called controllers in other jurisdictions) to lawfully process the personal information of data subjects.

BUSINESS CONTINUITY

Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted by a disaster or unplanned incident that take critical systems offline.

IS SOUTH AFRICA READY FOR CLOUD INFRASTRUCTURE

Is South Africa technologically advanced? South Africa has one of the largest information and communications technology (ICT) markets in Africa. ... As an increasingly important contributor to South Africa's GDP, the country's ICT and electronics sector is both sophisticated and developing

DATA GOVERNANCE

Data governance is a collection of processes, roles, policies, standards, and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.

SERVICE ASSURANCE (ISO COMPLIANCE)

ISO compliance means adhering to the requirements of ISO standards without the formalized certification and recertification process. … A company can obtain a certificate of compliance that provides customers and business partners with assurance.

DISASTER RECOVERY (BACKUPS)

Backups or backing up refers to the actual copies or copying of files and data. Disaster recovery (DR), on the other hand, encompasses the full strategy for responding to a disaster event and putting the backups into action.

INTERNAL IT PERSON COMPARED TO OUTSOURCES COMPANY

Insourcing generally places new operations and processes on-site within the organization, while outsourcing involves an outside organization that is separate from the primary organization's operations

THREAT/RISK MANAGEMENT

What is a threat risk management? In a nutshell, risk is the potential for loss, damage or destruction of assets or data caused by a cyber threat.

get some answers

  • What is the POPI Act and what does it take to be compliant?
  • Will your business need to be compliant and what would happen if you don’t comply?
  • The POPI Act has come into effect on the 1ste of July 2021 and Baseline IT has partnered up with attorneys to provide you with a full POPI Compliance solution.– POPI Compliance IT Audit

    – Data Security Policies & Procedures

    – Data Security Consults & Awareness

    – Agreements and Notices Audit

  • How will the POPI Act Affect our organization?
  • What information would be classified as “Personal”?
  • Does my organization need to comply with regulatory standards like ISO, POPI?
  • Do you have onsite backups for recovery
  • How safe and affordable are cloud backups​?
  • What retention policy is recommended for your data​?
  • Do you have onsite backups for recovery?
  • How safe and affordable are cloud backups?
  • What retention policy is recommended for your data?
  • Certain geographical locations have good enough internet speed
  • Data Centers in RSA are satisfactory to secure data

Internal IT

  • They become very well equipped with the internal systems
  • Everyone in the company knows the person well
  • Easy to walk over to them and ask for assistance
  • Usually tasks not tracked in ticket system accurately
  • All knowledge is with one person`

Outsource IT

  • Each ticket will be logged into a system and assigned
  • Knowledge is spread between more than one technician
  • Quick turn Around time on Remote support
  • Different levels of escalation and experience
  • Always available 24/7 Support
  • Where are you storing your data?
  • How is your data secured?
  • What Policies are in place for accessing Data?
  • What are you doing with the Data captured?
  • How do we control data storage and data lifecycles?
  • What are your Risks from a Cyber Attack perspective?
  • How can onsite Access become a Risk for Data?
  • During an attack on the Infrastructure what systems are in place to recover?
  • What systems prevent Risk to minimize the attack?
  • How do we detect and respond to threats like malware and phishing scams?
  • What is the recommended password reset policy?

Get in touch