top of page

Data Security

Client Data Security Alignment

We work with each client to understand their data security needs, so we can align.  We document which data types require protection.

Defining Authorized Tools & Secure Access
We outline which tools are authorized for what types of use. IE - Using SharePoint vs. G-Drive for content storage.  We also define any VPN, hardware our secure tunneling tools may be required.

Training Agents on Security Protocols
Agents are trained on 2FA/ MFA needs, password requirements, and device restrictions.  Instructions for locking screens and fully logging out re reviewed.   Monitoring and logging processes are set up.

backbutton_clar.png
bottom of page