top of page
Data Security
-
We work with each client to understand their data security needs, so we can align. We document which data types require protection.
-
We outline which tools are authorized for what types of use. IE - Using SharePoint vs. G-Drive for content storage. We also define any VPN, hardware our secure tunneling tools may be required.
-
Agents are trained on 2FA/ MFA needs, password requirements, and device restrictions. Instructions for locking screens and fully logging out re reviewed.
-
Monitoring and logging processes are set up.
bottom of page
