Our Vision
We envision a world where cybersecurity is not just a tickboxing exercise, but a fundamental pillar of every organization's operations, enabling innovation and collaboration while mitigating risks and ensuring resilience against emerging threats.
At the heart of this vision lies the understanding that true security goes beyond just protecting the business itself; it is also about equipping the employees who comprise it with the fundamental skills and knowledge as a robust security culture comes from within the people, both in the office and at home.
Through our dedication to empowering our clients with robust security solutions, we strive to contribute to this vision of a safer and more secure digital ecosystem for all, even to those who may have limited resources, but still face no less critical security challenges.
Our Services
Policy development and Implementation | Security Standards and Regulations | Security Awareness Program |
We assist in reviewing and developing security policies and procedures, ensuring they are aligned with industry best practices and regulations. | Developing, implementing, and improving security management systems based on Information security best practices and standards | Developing, delivering, and supporting company-wide security awareness programs, including specialised trainings. |
Auditing | Supply Chain Security | Security Documentations & Toolkits |
Conduct risk assessments of internal systems, processes, and controls to identify vulnerabilities, inefficiencies, and compliance gaps. | Assess and mitigate risks associated with third-party vendors, suppliers, and partners within the supply chain. | Crafting comprehensive and tailored information security documentation and toolkits tailored to your needs for various processes and procedures. |
Why Us?
Holistic Approach | Tailored Solutions | No Tickboxing for Show |
Developing a robust security posture that encompasses technical measures, organizational policies, processes, and culture. | Personalized approach to every client engagement, customized solutions for the unique challenges and requirements. | Deep-rooted commitment to genuine security transformation. Instead of compliance checkboxes and ineffective measures. |
European-Wide Expertise | Positive Impact | Cost-Effectiveness without Compromise |
Delivering a unified experience from across Western and Central Europe. | Reduced rates for NGOs, non-profits, and those who may have limited resources, but still face no less critical security challenges. | Operating with agility and efficiency to offer competitive pricing without compromising on quality. |
"Security is always excessive until it's not enough."
Robbie Sinclair
Last Updated: 25.02.2024
Version: 3.0
INTRODUCTION
This policy explains how and why we use cookies, and specifically how we use strictly necessary cookies.
WHAT ARE COOKIES
Cookies are small data files that are placed on your device when you visit a website. Cookies allow a website to recognize your device and remember your preferences or actions.
TYPES OF COOKIES
There are different types of cookies. Some cookies are essential for the website to function properly, while others are used for analytics or advertising purposes.
STRICTLY NECESSARY COOKIES
Strictly necessary cookies, also called essential cookies, are required for the website to function properly. These cookies are essential for enabling basic features such as page navigation, security, and proper website loading. Without these cookies, websites may not work correctly and securely.
COOKIES WE PROCESS
We only use strictly necessary cookies on our website. We do not use any other types of cookies, such as performance or targeting cookies. As these cookies are strictly necessary for the operation of the website, we do not require user consent for their use.
Below we list the cookies we use:
Cookie Name | Purpose | Third Party | Privacy Information |
cf_clearence |
We use Challenge Platform by Cloudflare to filter legitimate visitors from bots. This is important to protect us from various security threats and to protect our end-user from malicious bots and attackers.
cf_clearence is used to store the proof of challenge passed, so visitors might no longer need to be challenged when present. |
Cloudflare | https://www.cloudflare.com/privacypolicy/ |
__cf_bm |
We use __cf_bm from Cloudflare to ensure that bots are identified and we are protected from bad bots.
This cookie expires after 30 minutes of continuous inactivity by the end user. |
Cloudflare | https://www.cloudflare.com/privacypolicy/ |
DATA PROCESSING
We use a third-party website hosting company "Cloudflare" to process the above mentioned necessary cookies. The hosting company processes personal data on our behalf and is therefore a data processor. For more information see our privacy policy.
UPDATES TO THIS COOKIE POLICY
We may update this cookie policy from time to time. Any changes will be posted on this page, and we will notify you of any significant changes by email, if you have provided us with your email address.
CONTACT US
If you have any questions or concerns about our use of strictly necessary cookies, please
contact us.
For other information relating to your privacy, please see our
privacy policy.
Last Updated: 25.02.2024
Version: 3.0
This Privacy Policy outlines how Oxchi Security ("we," "us," or "our") collects, uses, and safeguards personal information obtained through the website oxchisecurity.com. This policy solely pertains to information gathered by and via our website.
Types of Personal Information Collected
We gather the following types of personal information on our website:
Purpose of Data Processing
We process personal information collected through strictly necessary cookies for the following purposes:
Legal Basis for Processing
The processing of personal information collected through strictly necessary cookies is based on:
Data Retention
We retain personal information collected through strictly necessary cookies for a limited period necessary to achieve the purposes for which they were collected.Summary Table:
Types | Purpose | Legal Basis | Retention |
Strictly Necessary Cookies | Security and functionality of the website. | Legitimate Interest | As long as necessary to fulfill the functionality. |
Personal Information Via Correspondence | Communication (inc. marketing), Contracts, Legal Claims |
Consent
Performance of a Contract Legitimate Interest |
Until purposes are fulfilled for which it was collected. |
Data Subject (You) Rights:
International Data Transfers
Currently, we do not use third parties or locations which would fall under the requirements of International Data Transfers.
Updates to the Privacy Policy
We may update this Privacy Policy periodically to reflect changes in our privacy practices. Any material changes will be notified through our website or other means.
Contact Information
For questions or concerns about this Privacy Policy or our data practices, please contact us at [email protected].We use cookies.
We utilize strictly necessary cookies as they are essential for the proper functioning of our website. To learn more about how we use cookies on our website, please refer to our cookie policy.