[servicemenu]
Navigating Cyber Security Compliance can be daunting. Government regulations, requirements and laws are changing continually. This makes understanding which documentation to provide during audits confusing. Our straightforward documents are simple to understand and are the building blocks to any cyber security requirement.
The Policies cover the cyber security domains that make up the Security Framework and
multiple governance requirements. One centralized managed portal for all your documents make it simple to manage. You also have access to our advisory experts.
Our process is painless and easier than you ever imagine.
Easy as 1, 2, 3…
- Purchase
- Fill out the On-Boarding Form
- Receive Login to our secure portal
Once completed we will provide you with customized documentation. The portal is a secure centralized portal which manages Policy Documentation, Asset Reports, Agreements, Company Policies, Standards and Procedures, Awareness Information. Always available for your needs.
What is included with my company policy?
Security Policies
- Overall Information Security Policy
- Data Classification and Governance Policy
- Systems Operations
- Availability Policy
- Asset Inventory Policy
- Device Management Policy
- Systems Security Policy
- Network Security Policy
- Access Control Policy
- Identity Management Policy
- Business Continuity Policy
- Disaster Recovery Policy
- Systems Monitoring Policy
- Network Monitoring Policy
- Physical Security Policy
- Environmental Controls Policy
- Customer Privacy Policy
- Systems Development Policy
- Application Development Policy
- Quality Assurance Report
- Vendor Access Control Policy
- Third Party Provider Policy
- Risk Assessment Policy
- Incident Response Policy
- End User Security Awareness Training
Employee On-Boarding
- Acceptable Use Policy
- Clean Desk Policy
- Email Policy
- Ethics Policy
- Password Construction Guidelines
- Password Protection Policy
- Remote Access Policy
- Remote Access Tools Policy
- Wireless Communication Policy
- Database Credentials Policy
- Software Installation Policy
- Workstation Security Policy (HIPAA)
- Internet Usage Policy
- Web Application Policy
- Removable Media Policy
Cyber Policy Advisor Access
- 24×7 Email Support (included)
- Scheduled Phone Call (included)
- Standards-Procedures Library (included)
- Initial Document Creation (included)
Additional Services
End User Security Awareness Training (program options)
- On-Demand Video Training (additional costs, optional)
- 3-4 minute Animated Videos on specific subjects
- Monthly Episodes
- Awareness Library (over 75 episodes)
- Interactive Quiz
- Friends and Family Usage
- Employee Engagement Reports
- Infographics (included)
- Monthly Email Newsletter (included)
- Awareness Slide (included)
- On-site Employee Training (optional)
- Onsite Small Groups
- Security Webinars
- Onsite 90 minute Session
- Power Point Presentation
- Video 3-4 minutes
- Video Discussion
- Quiz
- Q&A
- Monthly Email Newsletter
- What to do in the event of….sessions
Documentation Authoring
- Updated Documentation Edits
- RFP Response Documentation
- Reporting
- Detailed Asset Report
- License Key Compliance Reporting
- Business Impact Analysis
- Incident Reports
- Test Documentation
Security Testing Services
- Penetration Testing Services
- Vulnerability Management Services
- Simulation Services
- Ethical Hacking Services
- Vulnerability Scanning
- Cyber Forensic Services
Protection Services
- Intrusion Prevention
- Advanced Threat Protection
- End Point Security
- Email Security
- Web Security
- Gateway Protection
- SaaS Application Security