Security & Compliance

Powerful network defense schemes so your data remains protected and your reputation stays intact

sideimg-Security-Compliance

There are no shortcuts when it comes to protecting sensitive client data

Businesses that handle sensitive client data need always-secure networks. That’s because cybercriminals are always working to steal it, using ransomware bugs, viruses, phishing scams, and other evolving technologies. They can even disrupt entire operations by severing network connections, corrupting software, and bringing hardware to a standstill.

Fortunately, there are plenty of cutting-edge cybersecurity tools and processes available to protect your business and all its endpoints, and SpliceNet is expert at effectively deploying them for your security.

STANDARD

path-orange

Preparation of the following standard policies for your company (including minor customizations from prebuilt options)

  • Account and Password Management Policy
  • Asset Management Policy
  • BYOD Policy
  • Change Management Policy
  • Configuration Standards Policy
  • Cybersecurity Training Policy
  • Data Backup and Business Continuity Planning Policy
  • Data Encryption and Key Management Policy
  • Data Privacy General Provisions Policy
  • Document Access Management Policy
  • Document Retention and Destruction Policy
  • Endpoint Email and Web Browser Protection Policy
  • Hardware and Software Acquisition
  • Policy Incident Response Plan
  • Log Management Policy
  • Network Security Policy
  • Patch Management Policy
  • Physical Controls Policy
  • Remote Access Management Policy
  • Risk Analysis and Management Policy
  • Sensitive Data Management Policy
  • Vulnerability Scanning and Penetration Testing
  • Policy Website Privacy Policy
  • Website Terms of Service Policy

PLUS

path-blue

1. Data Privacy Internal Audit including 239 questions from the following subject areas

  • Policies and Procedures
  • Risk Assessment Asset, Account, and Password Management
  • Physical Controls
  • Remediation
  • Configuration Management
  • Technical Controls (Generally)
  • Antivirus
  • Email Protection
  • Web Protection
  • Sensitive Data Handling
  • Security Scans
  • Log Management
  • Backup and Disaster Recovery
  • Security Testing
  • Incident Response Planning
  • Cybersecurity Training

3. Your current score (out of a possible 1,249 points)

4. A list of recommended changes, categorized by whether the recommended change is:

  • Administrative
  • Technical
  • Physical
  • Automation
  • Reporting

5. Preparation of all the standard policies for your company (including minor customizations from prebuilt options) that are included in the Standard Package

PREFERRED

path-orange

1. Everything from the Plus Package, AND

2. Monthly calls to review the progress of administrative, technical, and physical controls (including automation and reporting improvements)**

3. Monthly review of all relevant security-related reports, including any recommendations based on them**

4. Monthly Executive Committee Report on status of Data Privacy improvements

5. Unlimited advice and customization of any policy listed in the Standard Package

6. Creation and quarterly review of the following:

  • Approved Wireless Access Point Log
  • Standard Configuration Deviations Log
  • UPS Servicing Log Web Filtering Exceptions Log

7. Unlimited email advice regarding:

  • Cyber-insurance
  • Data privacy risk management
  • Data privacy policy and procedure questions

PREMIER

path-blue

1. Everything from the Preferred Package, AND

2. Weekly calls to review the progress of administrative, technical, and physical controls (including automation and reporting improvements)**

3. Unlimited assistance completing any vendor security questionnaires or audits

4. Unlimited email or phone advice regarding:

  • Cyber-insurance
  • Data privacy risk management
  • Data privacy policy and procedure questions

5. Quarterly in-person meeting to discuss the state of your data privacy plan

Our Cybersecurity & Compliance Services covers:

icon-Regulatory-Compliance

Regulatory Compliance

Automated, industry-specific compliance management

icon-Firewalls

Firewalls

State-of-the-art firewall protection for your internal and external networks

icon-WiFi-Management

Wi-Fi Management

Access, traffic, and content control, management, and filtering

icon-24-7-365-Security

24/7/365 Security

Around-the-clock network scanning and monitoring for threat detection & elimination

icon-Email-Antivirus-Protection

Email & Antivirus Protection

Protection from phishing, malware, viruses, and other malicious actors

img-All-Inclusive

All-Inclusive

img-Professional

Professional

img-Affordable

Affordable

Cybersecurity Monitoring & Compliance

Get 24/7 proactive monitoring & maintenance of your entire IT infrastructure

Learn more

Technology Management & Consulting

Complete even the most massive IT projects on time and within budget

Learn more

Client Attraction &
Retention

Web searches and sites that turn leads into clients

Learn more