top of page

Data Security

  • We work with each client to understand their data security needs, so we can align.  We document which data types require protection.

  • We outline which tools are authorized for what types of use. IE - Using SharePoint vs. G-Drive for content storage.  We also define any VPN, hardware our secure tunneling tools may be required.

  • Agents are trained on 2FA/ MFA needs, password requirements, and device restrictions.  Instructions for locking screens and fully logging out re reviewed. 

  • Monitoring and logging processes are set up.

backbutton_clar.png
bottom of page