Protection of sensitive information by implementing cybersecurity threat controls
Disaster recovery protocols based on a resilient, cloud-based computing environment that provides secure access to critical applications and company data
Assessment of building level controls to ensure protection of critical building systems. Third party partnerships also bolster the cybersecurity function by conducting regular penetration testing, domain monitoring, training and administering phishing tests and biannual mock audits of cybersecurity controls.