top of page
Data Security
Client Data Security Alignment
We work with each client to understand their data security needs, so we can align. We document which data types require protection.
Defining Authorized Tools & Secure Access
We outline which tools are authorized for what types of use. IE - Using SharePoint vs. G-Drive for content storage. We also define any VPN, hardware our secure tunneling tools may be required.
Training Agents on Security Protocols
Agents are trained on 2FA/ MFA needs, password requirements, and device restrictions. Instructions for locking screens and fully logging out re reviewed. Monitoring and logging processes are set up.
bottom of page
