The opportunities from internationalizing your business have never been greater. We assist clients set up their business registration with the Registrar of companies, provide contact for preparation of memorandum and articles of associations, registration of PIN, registration on i-tax among others.

Business Valuation

Valuation is not a simple numbers exercise. A good valuation relies on a blend of data analysis, industry expertise and commercial judgement. We will work to understand your business and industry to ensure we apply the relevant valuation methodologies.

Cashflow projections assignments
If a business cannot manage their cash flow, then current and future financial obligation might not be met. Every financier needs financial projection, and we assist the clients with this headache.

Company Secretary Services

Outsourcing your company secretarial responsibilities means we can take care of Companies Act statutory compliance while you focus on your business

 Recruitment of Accounting Staff

We assist client match the human resource needs especially in financial related position with the right skills.

Transfer Pricing Policy

We can assist clients evaluate or prepare transfer pricing policies that are in compliance with the Kenya Revenue Authority.

Negotiations and Arbitration

Whether you are looking to buy or sell a business, our services are tailored to meet your individual requirements. We can advise you on the entire transaction, from initial approaches to negotiations and completion, or carry out individual tasks.

Receivership
Challenging economic times inevitably leads to greater risk of companies encountering financial difficulties. Experience of business recovery across a wide variety of industries and circumstances enables us to provide an early assessment of potential solutions to your problems, whether a sudden reduction in cash flow or an unpaid debt from a major customer.

Information System and Data Security Audits

“Hacking” is no longer in the domain of high value, high stakes business. It is a serious everyday threat for organisations of every type and size that rely on IT to facilitate their business. Reliable security depends on understanding the exposure, weaknesses and the threats that could lead to a breach in the defences that could be exploited to access or damage information systems and data.

We at UHY understand this and offer our clients comprehensive penetration testing services as well as training for not technical staff who may be targets of attackers trying to breach enterprise security.

What is Penetration Testing?  

“Penetration Testing” or “Ethical Hacking” is the process of identifying vulnerabilities in your technology environment and assessing the exposures they create. This is performed in the same way as a malicious attacker would, with the same techniques and tools, however, without the malicious intent. This allows the enterprise to understand the level of exposure that it has to the various forms of attack and is the only real test that uncovers hidden vulnerabilities. It is a convincing tool in planning remediation activity and security spend effectively.

Typical Test Process

Testing involves five key stages, with the option to “penetrate” during an assessment if there is sufficient need, risk appetite and potential reward.

  1. Scan: Passive and active scanning techniques are used to identify possible targets.
  2. Analyse: Analysis and cross-referencing of vulnerabilities found on the targets.
  3. Follow up: There is no substitute for the experience of a seasoned tester; any findings from the prior stages are manually verified to eliminate false alarms.
  4. Penetrate: During the manual follow up of findings, our test teams may discover vulnerabilities that if exploited, could bring further levels of access. If this is the case, a full risk and business impact analysis is performed and presented to you, so that you can decide if the potential value outweighs the likely risk.
  5. Report: The key to value is a report the business can understand, with practical recommendations of deeply technical issues, analysis of potential root causes and a clear explanation of the risks.

Why do I need this?

Although the organisation may have invested in significant security safeguards, a penetration test carried out by an independent third party can provide assurance that the safeguards in place are effective and thus protecting the organisation’s reputation with customers, business partners and regulators – ultimately acting as a business enabler.

Training

We conduct training programs for end users as well as IT staff to ensure that they have a comprehensive understanding of the threat landscape. Our consultants take IT staff through an intense threat assessment and management program ensuring that they are able to identify and stop potential risks that may be a threat to your business.