en

Security Protocol for INOI

Client:
INOI GLOBAL MOBILE PHONES LLC – international manufacturer of mobile devices
Industry:
Information technology
Focus:
Development of a corporate Security Protocol to ensure readiness for cyber incidents
Main challenge:
Creation of a unified document that defines roles, responsibilities, procedures during incidents, and IT system recovery processes
Market:
International
Services provided:
Development of a Security Protocol – cybersecurity consulting
Key Takeaways
  • A personalized Security Protocol has been developed
  • The company's readiness for crises has been improved
  • BCP and DRP plans have been implemented to ensure business continuity
  • A Crisis Communication Plan has been created
  • Processes for responding to cyber incidents have been documented
  • 1
    Security Protocol
    1
    Week project duration
    3
    Plans: BCP, DRP, Crisis Plan
    Security Protocol for INOI
    In the event of a cyber incident, a company must have a clear action plan; otherwise, it risks losing data, money, time, and reputation. To avoid this and act in a coordinated manner in such situations, INOI turned to Datami to develop a corporate Security Protocol that would provide a structured incident response and post-incident recovery framework.

    INOI GLOBAL MOBILE PHONES LLC is a manufacturer of mobile devices, including smartphones and tablets. The company processes personal data and is subject to GDPR requirements.

    INOI understands the risks of modern business and takes its cybersecurity seriously. For the company, it is important to have clear internal procedures for crises to ensure business stability under any circumstances.

    Challenges and tasks
    The client turned to Datami to develop a Security Protocol that would help the company improve its readiness for cyber incidents.
    The task had to be completed within 1 week, following the principles of the OODA loop for fast and well-considered crisis decisions.
     
    • Develop a Security Protocol for the company
    • Create BCP, DRP, and Crisis Communication plans
    • Ensure compliance with GDPR requirements
    icon
    Business Continuity Plan
    Create a foundation for maintaining critical business processes in the event of cyber incidents.
    icon
    Disaster Recovery Plan
    Describe the procedures for the rapid restoration of IT systems and data.
    icon
    Crisis Communication Plan
    Define clear channels, timelines, and responsible parties for informing stakeholders.
    Key project stages

    During this project, Datami specialists focused on creating a practical Security Protocol and thoroughly working through all aspects of incident response.

    Within a week, the team conducted analysis, developed plans, and agreed on the final version of the document.

    • Data collection and BIA
      Communication with INOI representatives, study of IT systems, and Business Impact Analysis to determine critical processes.
    • Protocol development
      Creation of BCP, DRP, and Crisis Plan, integration of OODA loop principles, and Chain of Command.
    • Approval and finalization
      Client review of the document, introduction of revisions, and approval of the completed Security Protocol.
    How we can help you?

    Every cybersecurity case study we solve involves deep analysis, tailored solutions, and measurable results.
    Datami has already helped over 600 companies strengthen their digital defenses — and we can do the same for your business.
    Ready to take action?

    Let’s start with a free consultation!
    Results achieved
    Results achieved

    As part of this project, Datami developed a Security Protocol for INOI that combined technical, organizational, and communication response areas:

    • A Business Impact Analysis (BIA) was conducted;
    • Data backup and recovery were implemented;
    • RTO and RPO for critical systems were defined (≤ 4 hours / ≤ 15 minutes);
    • BCP and DRP plans were created according to ISO 27001 requirements;
    • A Crisis Communication Plan with a notification procedure was developed;
    • A Recovery Team with clear roles and an escalation plan was formed;
    • Regular recovery testing using hot-site and cold-site scenarios was introduced;
    • BCDR metrics (MTTR, SLA violations, management reporting) were implemented.

    After the implementation of the Security Protocol, INOI received a comprehensive system for incident response and business recovery. Datami specialists recommended reviewing the document at least once a year and after each security breach.

    Our certificates
    Project summary

    In the field of information technology, business stability directly depends on a company's readiness for crises. This case study demonstrated that thanks to the Security Protocol, INOI received a structured cybersecurity system. 

    In just one week, Datami provided the client with a document that significantly improved compliance with security requirements. Now INOI can confidently demonstrate to partners its readiness for business recovery after cyber incidents and adherence to SLA.

    Direction
    Before the project
    After implementation
    Readiness for cyber incidents
    Low; no response procedures
    High; approved protocol, assigned roles
    Business continuity
    No BCP or DRP
    BCP / DRP implemented
    Crisis communication
    No defined responsibilities or timelines
    Crisis Plan implemented (30 min – 2 hours)
    Compliance with standards
    Partial
    Increased, compliant with ISO 27001 and GDPR
    Project duration
    1 week
    More success stories with Datami
    Browse other project case studies
    Mobile App Security Outstaff Audit

    Mobile App Security Outstaff Audit

    • Identified dangerous configurations and data leaks
    • Strengthened security before product launch
    Services:
     
    Nov 20, 2025
    Security Policy Audit for a Fintech Company

    Security Policy Audit for a Fintech Company

    • Seven key cybersecurity policies were reviewed and assessed
    • Regulations aligned with ISO 27001, DORA, GDPR, and NBG
    Services:
    Security policy and compliance audit
    Nov 20, 2025
    Security Testing of the DonorUA Medical Platform

    Security Testing of the DonorUA Medical Platform

    • A report with recommendations for strengthening security was provided.
    • No critical security threats were confirmed.
    Services:
    Web application pentest (Black-box)
    Nov 18, 2025
    Security image
    Ready to assess your project's security?
    Contact Datami — we’ll help you identify risks, strengthen your cybersecurity, and confidently pass certification.
    Datami articles
    KillSec Ransomware Attacks Healthcare Datami Newsroom
    Datami Newsroom

    KillSec Ransomware Attacks Healthcare

    The hacker group KillSec has recently been actively attacking the IT systems of the healthcare sector in Latin America and other countries — the attackers have already stolen dozens of gigabytes and nearly 95,000 files.

    Nov 18, 2025
    Datami at MERGE Madrid and EBC 25 Datami Newsroom
    Datami Newsroom

    Datami at MERGE Madrid and EBC 25

    The Datami team attended MERGE Madrid and the European Blockchain Convention 2025 to share their expertise and witness how Web3 is evolving. This year, the focus shifted toward real-world solutions – security, auditing, and transparent standards.

    Nov 13, 2025 3 min
    Cyberattack Types Oleksandr Filipov: Security engineer at Datami, author of articles
    Oleksandr Filipov: Security engineer at Datami, author of articles

    Cyberattack Types

    To effectively protect data and systems, it is important to understand what types of cyberattacks exist and how they work. In this article, we will look at the main types of attacks and figure out how to protect your business from them.

    Nov 6, 2025 15 min
    Order a free consultation
    We value your privacy
    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy