1. Vulnerability Assessments and Quarterly Business Reviews (QBR)
2. Dynamic Security Monitoring, Patching
3. Insurance Review: At least once every year, we furnish a copy of our services and protections to YOU
4. [NEW!] Data Breach And Cyber-Attack Response Solution
5. Ransomware-Proof Backup and Cyberattack Recovery Plan
6. Security Policy for Mobile and Remote Devices
7. Develop Strong Company Password Practices
- Prohibit the use of the most common passwords. We start with the most commonly-hacked words.
- Send alerts to users for strange log-in attempts.
- Install an auto-lock mechanism for multiple failed attempts.
- Train employees how to create strong passwords and manage them well
- Keep software updated to ensure latest security updates are installed