programmer-typing-working-laptop-program

SECURITY PROTOCOLS

Our business takes security and compliance seriously and has invested in hardware, software, and processes to meet any of your customer security requirements, including:

  • Establishing HIPAA/HITECH compliance

  • A SSAE-18/SOC-1 audited facility

  • Conducting monthly policy reviews by our risk committee

  • Integrating combined zero access and need-to-know in both logical and building security

  • Full suite of insurance coverages, including cyber coverage

  • 24x7 monitoring of core network elements and systems

  • Bi-annual reviews and revisions as needed for our business continuity and disaster recovery manuals