Our goal is simple.

Security is always a critical concern. The right security policy protects you and your customers.

Security Policy

Some information must remain confidential to prying eyes, but available when you need it. Every day, we rely on our data to remain accurate and consistent – not modified or viewed by unauthorized users.

Cover the Basics

Confidentiality
Integrity
Availability

Access Control

Information can be categorized and made available only to those that need access.

Common groups include: Public, Sensitive, Private, and Confidential.

Cover the Basics

Identification
Authentication
Authorization

Administrative Policy

Written procedures and guidelines

Password policies keep intruders from easily accessing your system. A data classification policy keeps sensitive information available only to those that need it.

Logical Layers

Multiple layers restrict access

Passwords and access control lists can protect sensitive information. Only give access to what is needed, when needed – avoid giving more privileges than necessary.

Physical Protection

Basic aspects are often overlooked

Network/file servers should be separated from operations. Protect company assets by insulating employee duties so that they cannot abuse the system.