Business Consultancy Services

Whether you wish to meet compliance regulations or are seeking to enhance the protection of sensitive corporate data assets, IS Centurion Consulting Ltd can help provide assistance.

Information Security
& Privacy Consulting Services

Using our extensive expertise in cyber security, we’ve developed an innovative strategic approach which aligns risk profiling to the protection of your business assets. Most importantly, this innovative and personalised approach allows companies to achieve their specific goals and objectives. At IS Centurion Consulting Ltd, we’re dedicated to helping companies achieve their targets, which is why our security approach is specifically tailored to the needs of your business. Planning and preparation has always been an essential part of our services, which is why we’ll always take the time to listen to your concerns to ensure that we’re doing all that we can to resolve them. Over the years, our business has excelled because we have provided our clients with a strategic, tailored approach that is aimed at enhancing their cyber security.

If your company is interested in the opportunity to develop its cyber security then reach out to us today to learn more about our security services.

We can help you:​
Reduce assurance reviews
Develop your security culture
Process enhancement
Meet compliance obligations

Our Past Work:

  • Safeguarding mission-critical assets (in defence of military operations).
  • Providing 1st, 2nd & 3rd line information security support to financial companies.
  • Several years delivering Payment Card Industry Qualified Security Assessor (PCI QSA) across a myriad of industries.
  • Providing third party assurance services.
  • Supporting the security of the manufacturing industry.
  • Delivering awareness workshops.
  • Aiding businesses by providing ad-hoc security & risk support.
  • Providing virtual CISO support.
  • Data Privacy

    Everyone has a right to privacy.

    For all businesses, data protection is a vital measure that should be regularly assessed and improved to prevent the data being misused by online attackers. However, as companies have become increasingly reliant on self-processed data that is transmitted on company-owned systems, they have also become complacent in protecting this data. Despite the existence of data privacy laws, companies have overlooked the severity of online threats and the ways in which data can be abused for malicious purposes.

    As a result of this complacency, criminals have quickly identified that they can take advantage of this apathy and have established ways in which they can monetise corporate assets. In addition to this, as more consumers became victims to fraud, they lose faith in how these organisations treat their personal information.

    In an attempt to enhance data privacy regulations, the EU General Data Protection Regulation (GDPR) came into effect. This was to ensure that regulations were reflecting modern-day threats, as well as increasing business accountability and responsibility. One of the main advantages of GDPR is that it has considerably increased the maximum fine for non-compliance. Most importantly, it has made it mandatory that high-impact data breaches are reported.

    ​What is the difference between data privacy, information security and cyber security?

    These terms are easy to get confused with, as they all require formal documents, training for security awareness, auditing, technical defences, and incident responses for the protection of data. However, the main difference is that with data privacy, the businesses are only the temporary custodians of this data. Meaning that they are provided to them (on loan) from the data subjects. Whereas with other companies, critical data will, typically, belong to the business or be of a financial nature. Meaning that the importance of this data is relatively easy to understand.

    Data Life-cycle

    Being the custodians of the personal data, you need to inform the data subjects on how you intend to use their information. In addition to this, you need to ensure that you’re using this information with respect and securely disposing of it.

    The data life-cycle commences with consent or legitimate use and without which you are not able to comply with the data privacy principles and should refrain from further use, transfer or storage of such data, moving straight to the final stage of the data life-cycle (secure disposal).

    ​At the Heart of Data Privacy

    Businesses should recognise that data privacy should not be approached with minimal effort. They should demonstrate to their customers that they value the trust they have put in them to use their data responsibly.


    Many businesses have struggled to design and develop a suitable data privacy programme, which aligns to the business objectives and meets the requirements of their applicable privacy legislations. We have frequently heard businesses say that GDPR compliance is too expensive, too difficult to achieve and not worth the hassle.

    ​However, when planned correctly, the benefits are easily realised when you understand the value of the data, the measures needed to safeguard that data and the benefits of making the correct decisions.

    ​Treat your data privacy programme like servicing and maintaining a motor vehicle:​​

    The larger the vehicle : The greater the potential impact and the more expensive the parts (i.e. the braking system on a HGV)

    The more precious the cargo : The more protective measures applied (i.e. child seat for a new born baby).

    Selecting the appropriateness of the controls, is the responsibility of the data controllers and data processors and the amount of countermeasures you apply is your decision, based upon the value of the data, the threats and your risk appetite.

    If you’re struggling to keep up with the latest advancements in cyber security, IS Centurion Consulting Ltd can help you build robust protection for your organisation.

    The 4 Primary Activities Should Include:

    To begin any privacy programme, you need to see how personal data is transported though the departments of your business. Most importantly, you need to identify areas that are most at risk of being infected.

    Staff will need to be educated on the new regulations for interacting with data. In addition to this, companies will need to ensure that IT systems are managed appropriately and that data is being processed safely.


    For any privacy programme, the key to success is teamwork and governance to ensure that there is a constant cycle of reviewing and reporting. In addition to this, companies must make sure that they are thoroughly prepared for any imminent attack that could result in data theft. Furthermore, the results of periodic reviews need to be regularly sent to senior management for their approval and input.


    Lastly, documentation must a priority. Policies, processes, and standards must be documented alongside evidence that your staff understand the full extent of data processing environments.