Your most vulnerable blind spot leaves the door open to unwanted guests. Our strategic approach protects your most valuable asset, your Human Identity!


About the thinktum Cybersecurity Solution
& how we protect your business from online threats

We’ve gathered our expertise and recognize that as the cyber risks evolve, amazing tools are developed to mitigate those increasing risks. So, we’ve developed a holistic platform to leverage best in class technologies and therefore, the security best practices on the marketplace, to work in tandem to mitigate cyber risks; from detection to triage, response and remediation.

This results in a more automated and continuous source of monitoring and detection combined with holistic threat detection and response across all the layers of an infrastructure. Our platform provides visualization and analytics to help with awareness across network end points.

Where to start? Our platform allows you to just get started without any fear. Then the approach is to continue to evolve as your business requires, based on internal and external changes. 

Learn More

Our Approach


  • Initial call to better understand your business model and process flows. Map our initial assessment and provide our recommendations, no strings attached
  • Assess your digital environment, digital assets, accesses and network
  • Assess any policies in place (unfortunately, traditional policies don’t always cut it in our evolutionary digital world)


  • Non-technical Awareness Training for staff
  • Network, Endpoint and Application Protection
  • Anti-Malware Protection
  • Data Loss Prevention
  • Mobile Device Protection


  • Vulnerability Scanning Tools
  • Continuous Threat Detection and Monitoring Tools
  • Triage any security alerts and report back
  • Monitor online behaviours to detect anomalies as potential threats


  • Incident Response
  • Cyber Insurance Review
  • Response and Communication Planning
  • Backup and Recovery Strategies

Take the thinktum Cybersecurity Assessment!


1 / 20

Does your organization have a wireless network, or do employees or customers access your internal systems from remote locations?

2 / 20

Does anyone in your organization take company-owned mobile devices (e.g., laptops, smartphones and USB drives) with them, either home or when travelling?

3 / 20

Does your organization use Cloud-based software or storage?

4 / 20

Does your organization have a “bring your own device” (BYOD) policy that allows employees to use personal devices for business use or on a company network?

5 / 20

Are any employees allowed access to administrative privileges on your network or computers?

6 / 20

Does your organization have critical operational systems connected to a public network?

7 / 20

Does anyone in your organization use computers to access bank accounts or initiate money transfers?

8 / 20

Does your organization store sensitive information (e.g., financial reports, trade secrets, intellectual property and product designs) that could potentially compromise your organization if stolen?

9 / 20

Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include government-issued ID numbers and financial information.

10 / 20

Is your organization part of a supply chain, or do you have supply chain partners?

11 / 20

Does your organization conduct business in foreign countries, either physically or online?

12 / 20

Has your organization ever failed to enforce policies around the acceptable use of computers, email, the Internet, etc.?

13 / 20

Can the general public access your organization’s building without the use of an ID card?

14 / 20

Is network security training for employees optional at your organization?

15 / 20

Can employees use their computers or company-issued devices indefinitely without updating passwords?

16 / 20

Has your IT department ever failed to install antivirus software or perform regular vulnerability checks?

17 / 20

Can employees dispose of sensitive information in unsecured bins?

18 / 20

Would your organization lose critical information in the event of a system failure or other network disaster?

19 / 20

Can employees easily see what co-workers are doing on their computers?

20 / 20

Has your organization neglected to review its data security policies and procedures in the last year?

Your score is

Security Questions … We Covered Them


Have we provided adequate staff training, awareness and assisted with cybersecurity hygiene?

Have we provided the tools, policies and controls to protect staff?

Do we have adequate cybersecurity knowledge and competency?


How does our cybersecurity program apply industry standards, best practices, and compare with industry peers?

What is our current level of cyber risk, and its potential business impact?

Do we have formalized response processes and capabilities, including a security incident response plan and business continuity plan?

Do we have a process for continuous improvement for cyber resilience?

Are core business and financial processes adequately secure and how do we know?


Have we performed a thorough cyber risk assessment of our use of technology?

Are our controls equal to the risks and how do we measure effectiveness?

Is our cyber resilience strategy focused on our business objectives, protecting our most critical assets and providing business continuity?