Information security consulting

Information security is essential for business continuity. Whether you need an extra pair of hands for continuous security development or support for a specific project, let our experienced consultants help.

Information security is essential for business continuity

If your information security fails, your entire business is at risk – whether with employees, customers, competitors or authorities.

Antivirus software alone is no longer enough, as every company is now a global target in the cloud era. 99% of attacks could be prevented with very simple measures.

Strengthen your security with ready-made packages

Information security consists of three basic elements: protecting users, devices, and data. You can rely on us for support in any of these areas.

Protecting users

Employees are the Achilles’ heel of your company’s information security. Protect your staff – and avoid human errors. These packages help you do just that.

Information security development day

Microsoft Secure Score

Microsoft 365 already measures your organisation’s security level, which can be compared with other similar environments. Together with a Tietokeskus consultant, we review the service status and identify development areas step by step.

Low-hanging fruit and easy ways to improve security

  • After a quick analysis, we prepare a plan for how to improve your security level within your current licence framework
  • A clear, easy-to-follow path to stronger security – with steps taken in the right orde

Information security development day

Excl. VAT

1350€

Information security training

Comprehensive staff training ensures that today’s minimum security requirements are met. Our training sessions are thought-provoking and offer valuable refreshers even for seasoned professionals.

All sessions are delivered by experienced security consultants certified as Microsoft Certified Trainers (MCT).

Topics include:

  • The current state of information security
  • Identities and identity management
  • Phishing, scams and social engineering
  • How to recognize and act in security situations
  • Social media, artificial intelligence, passwords and much more!

Information security training

Excl. VAT

from 2000€

Microsoft 365 attack simulation

Tietokeskus consultants can assess your staff’s information security awareness by testing them with realistic but safely executed simulated attacks.

We target users with different types of phishing emails, links, and other tactics used by real attackers. A comprehensive report shows how many users were tricked, which is reviewed with the designated audience.

The collected data is then used to improve end-user training and strengthen security measures

Microsoft 365 attack simulation

Excl. VAT

from 2000€ + licenses

Multi-factor authentication and its development – Microsoft 365

  • Multi-factor authentication requires users to verify their identity in several steps, preventing outsiders from exploiting stolen credentials.
  • As part of this, we also introduce passwordless sign-in. Without it, everything depends on the employee’s password (which, for some reason, is still often “password123”).

Multi-factor authentication and its developmen

Excl. VAT

from 1350€

Creating an information security policy

  • Ensure that every employee in your organisation follows secure working practices.
  • In a joint workshop, we create a security policy that meets your organisation’s needs and ensures careful handling of data and systems. We also provide guidance for staff to follow it.

Creating an information security policy

Excl. VAT

from 2700€

Continuous improvement of information security

Let’s design an annual security roadmap together.

Microsoft 365 provides built-in metrics (Secure Score) for security, which adapts to all licence levels. This allows us to measure improvements and ensure that the right actions are taken.

Protecting devices

Take control of your device security: ensure that if a device is lost or stolen, no unauthorized person can access it.

Key elements of device protection:

With Microsoft Defender for Business, you can efficiently protect all endpoints and user identities.

Vulnerability scanning

Comprehensive vulnerability scanning and reporting of your environment identifies and highlights critical weaknesses. All network-connected devices, including those visible on the public internet, can be scanned.

Network vulnerabilities: Identifies open ports, weak encryption, and misconfigured services.

Device vulnerabilities: Detects outdated software, missing updates, and known OS and application vulnerabilities.

Reporting: Detailed reports with discovered vulnerabilities, criticality levels, and recommended actions.

Vulnerability scanning

Excl. VAT

2700€ + licences

Licences €4.30–€5.00 per user (VAT 0%)

Application environment mapping

A clear overview of your applications, their functions and importance is a vital part of modern information management. Who is responsible for the application, who is the main administrator, and who pays the bill?

Mapping helps identify dependencies between different systems

  • Conducted through key person interviews, either onsite or remotely
  • Based on the interviews, we map out application dependencies and list detailed information in a separate document
  • Provides a strong foundation for future audits
  • Establishes criteria for assessing fault tolerance and recovery capability in technical security audits

As a result, your organisation will have a clear understanding of your application landscape and all applications in use.

Application environment mapping

Excl. VAT

alk. 1350€

Protecting data

Protect your company’s documents and sensitive data. We ensure that only authorised users have access to important files.

Sensitivity Labels – Microsoft 365

  • Encrypt your files so that each file recognises who can open it and where.
  • For example, files created by HR are automatically restricted for internal company use only – even if someone else gets hold of them, they cannot open them.
  • Together, we’ll create a playbook and define the rules for protecting and classifying content.

Sensitivity Labels

Excl. VAT

2700€

Encrypted email – Microsoft 365

  • Ensure that no external party can read your important messages.
  • Gain access to encryption for both messages and attachments.

Encrypted email

Excl. VAT

1350€

Securing your Office 365 environment (Defender for Office 365)

Leave your worries to us – security as a service

Gain a 360° view of security threats and response capabilities with a clear monthly fee.

Why should your company choose Tietokeskus for information security?

We always consider the balance between cost and value. Simply getting the basics right takes you a long way – we won’t sell you a complex solution you don’t really need.

  • We always take into account your company’s size, industry and business needs to find the right solutions
  • We understand that overly strict security can hinder operations, so we focus on usability and end-user experience.
  • We help you get the most from your existing M365 licences and recommend the right ones based on your needs.
  • You’ll be supported by a skilled specialist focused on security – someone who truly knows what must be in place for your organisation’s protection. No vague talk, just real solutions.

Are you interested in our services or would you like to request a offer?

Leave your contact details and we will be in touch.