SECURING
DIGITAL TRUST

The Mobius approach to
Securing Digital Trust

At Mobius, we believe organisations cannot confidently accelerate their digital journey without trust, that’s why we work with you to develop sustainable data risk resilience into your business systems, by building and implementing practical and relevant solutions that ensure you know and can secure your digital risk landscape.

  • KNOW YOUR RISK LANDSCAPE

    Let us confidently accelerate your digital journey by helping you know your risk landscape.

  • DEVELOP YOUR DIGITAL RESILIENCE

    We work with you to develop sustainable data risk resilience into your business systems.

  • Mobius Icon Trust

    SECURE YOUR DIGITAL JOURNEY

    Have confidence in your secure digital risk landscape.

Our Trusted Services

INFORMATION
SECURITY

No business is immune to cyber attacks. The key to your defence lies not in evasion, but in preparation.

CYBER
SECURITY

Identify and remediate the underlying problems in your organisation.

THIRD PARTY RISK
MANAGEMENT

Third Parties often process or have access to your business’ sensitive information.

ITGovIcon

Digital Governance

Adopt tailored, cost-effective processes to govern and manage your information technology as it grows.

digitalassuranceIcon

Digital Assurance

Enjoy overall assurance that your technology is optimised and geared for the future.

digitalconsultingIcon

Digital Technology Consulting

Get the most from your technology investment.

IAGIcon

Identity & Access Governance (IAG)

Simplified IAG so it can be understood and embraced throughout your organisation.

informationprivacyIcon

Information Privacy

Navigate regulations and drive your own privacy controls sustainably.

cybersecurityIcon

Outsourced Services

Accelerate your Information Risk Management maturity by leveraging external expertise.

securitytestingIcon

Security
Testing

Address all your challenges from the ground up, so you can be secure and stay secure.

Client Stories

Information Security Assessment in DevOps for a Retail Company

A company in the retail industry approached Mobius Consulting to conduct a high-level assessment of their security in DevOps. The…

Consulting Hours
+
Clients Serviced
+
Projects Completed

Team Stories

Team Stories

Sandhya Mohan-Pillai
Managing Director

Sandhya Mohan-Pillai (CGEIT, CISA, CISM) has over 20 years of IT Consulting experience across a number of areas with specific focus on Information Security,…

Team Stories

Raymond Du Plessis
Director

Raymond du Plessis (CISSP, CISA, CISM, CRISC and CSX) is a Director with extensive experience in Cyber Security. With over a decade of experience,…

Team Stories

Yolandi Moodley
Director

Yolandi Moodley (BCom (Hons), CISA, CISM, ISO 27001 Lead Auditor and Implementer) is a Director and Information Security service line leader. With over 12…

Team Stories

Candice Jackson
Principal Consultant

Candice Jackson (CIPP/E, CGEIT, CISA, CRISC) is a Principal Consultant. With over nine years of IT consulting experience, Candice has expertise in the Governance,…

Team Stories

Candice Jamieson
Principal Consultant

Candice Jamieson (CIPM, CDPSE, CISM, CISA, CIA, ISO 27001 Lead Auditor) is a Principal Consultant and Digital Assurance and Privacy service line leader. Candice…

Team Stories

Sherneal Subban
Senior Managing Consultant

Sherneal Subban (CISM, CRISC, CMSC, ISO 27001 Lead Implementer & Auditor)  is a Senior Managing Consultant with over nine years of experience in Information…

Thought Leadership

News

THE RISKS OF A SINGLE IT PROVIDER MODEL
THE HIDDEN IT RISK THAT COULD SHUT DOWN YOUR BUSINESS

INTRODUCTION Many small and medium-sized businesses depend heavily on a single IT person or provider, sometimes without realising the risk until it’s too late. If that individual becomes unavailable during a security incident or system failure, it could halt operations entirely. We have seen businesses unable to access their cloud services, manage financial platforms, or even respond to clients –

News

Quantum Leap: Fortifying Cyber Security Against Tomorrow’s Threats

INTRODUCTION In an era where digital transactions are integral to everyday life, the reliance on cryptographic algorithms like Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) is crucial. However, the rise of quantum computing threatens to undermine these algorithms due to their ability to efficiently factor large numbers, endangering the public-key cryptography essential for secure online activities, including digital payments and

News

Navigating The Prudential Authority Joint Standards And The Potential Gaps In Your ISMS And Cyber Controls

In the ever-evolving and rapidly innovating landscape of financial services, the safeguarding of sensitive information against digital crimes and digital threats has become imperative for resilient services and for maintaining digital trust. To address these critical risks, the Financial Sector Conduct Authority (FSCA) and Prudential Authority have introduced the Joint Standards for Information Technology Governance and Risk Management Requirements, as

Recognition and Achievements

2020

ISACA YOUNG PROFESSIONAL OF THE YEAR

Candice Jackson

2018

ISACA SA PRESIDENT’S AWARD

Lynn Martin

2018

ISACA BEST CONFERENCE PRESENTER AWARD

Patrick Ryan & Amanda Hechter

2017

ISACA SOUTH AFRICA INNOVATION AWARD

Patrick Ryan

Securing Trust,
Globally

Map full

Let’s begin your journey together.

Our consultants will get alongside you and help you build an ecosystem of digital trust for all your organisation’s stakeholders.