Security Table with Interactive Colors
SECURITY

Awareness

Measures have been taken to ensure all customers are aware of security protocols and best practices.

Endpoint Encryption

Endpoint Encryption has been added on all local devices.

Managed SOC

Managed SOC solution has been implemented to all endpoints and actively being monitored by outsourced team.

Dark Web Monitoring

A monitoring solution has been fully implemented.

Managed DNS

Managed DNS with a 3rd party provider includes security and content filtering.

Next Generation Endpoint Protection

Replaces legacy anti-virus and anti-spam filtering, fully upgraded.

Application Whitelisting

Only permitted applications may run on the environment.

Anti-Phishing

Anti-phishing solution is installed and effective.

Content Filtering

Content filtering is enabled across all users, mitigating infection risks.
MANAGED SUPPORT & SERVICES

Onsite Support

Onsite Support is automated and properly managed.

Help Desk Support

Remote Help Desk is fully implemented for all supported endpoints.

Monitoring

Monitoring of server(s) and workstations is fully automated.

Inventory & Asset Management

Inventory & Asset Management is automated and up to date.

Windows & Application Updates

Windows updates on server(s) and workstations are automated and verified.

Virtual CIO Services

vCIO services such as budgeting and IT planning are well-tracked.

Proactive Maintenance

Proactive maintenance is automated and includes detailed reporting.

Mobile Device Management

Mobile device management (MDM) is fully configured for all smartphones.

Vendor Management

Vendor Management is effectively managed with consistent contracts.
INFRASTRUCTURE

Business Continuity

Business Continuity is in place with regular testing.

Server

Servers onsite have verified status and are functioning properly.

Backup & Disaster Recovery

Backups are in place for all individual machines and servers.

Remote Accessibility

Key employees have secure remote access.

Cloud to Cloud Backup

All critical SAAS applications are backed up and verified.

Disaster Recovery Plan

Disaster Recovery plan is regularly updated and tested.

High Availability

Redundant platform is implemented and tested.

Data Compliance

Office meets all necessary regulatory compliance requirements.

Workstations

Workstations are under warranty and running a supported OS.