
Services
One size doesn't fit all. Get security built for your business.
Technical and Software Solutions
Feature AWS, security automation.
Cloud architecture
AWS
Security Automation

Consulting Services
-
Initial Security/Privacy Compliance Coaching Program
-
Periodic Consults and check-ins
-
Review goals and tasks completed since the last check-in
-
Provide recommendations and establish next steps
-
Policy/Procedure Annual Reviews
-
Periodic Technical Reviews
-
-
-
Security and Configuration Review
-
Gap Analysis of provided policies and available security controls
-
Security and configuration assessment report
-
Incident response capabilities
-
Risk management capabilities
-
Configuration management processes
-
Technical security measures (encryption, malware, etc.)
-
Third-party risk management
-
Recommendations for security controls and improvements, including Single Sign On (SSO) and end-user device management solutions
-
-
Training Resources
-
Video-based training for workforce members
-
Windows device security
-
MacOS device security (for personal devices)
-
Using apple IDs
-
Video-based training for management
-
Policy customization and implementation
-
Apple ID policies
-
Webinar-Style Training
-
HIPAA Basics
-
HIPAA Refreshers
-
Online and email security (phishing prevention)
-
-
Security and Privacy Compliance Documentation:
-
Base set of compliance policies/procedures
-
Forms for tracking device inventory
-
Spreadsheets for tracking record management efforts
-
Template forms for on-boarding and off-boarding workforce members
-
Risk Assessment
-


Compliance and Regulatory Frameworks
Support compliance programs, help establish compliance programs, help evaluate wether you’re currently compliant, recommend solutions to make you compliant, help achieve compliance
Policies and Procedures
Gap Analysis
Risk Assessment
Training and Planning
Incident response, risk assessment, gap analysis, disaster recovery, business continuity planning
Incident Response and disataser recovery
Security Control Audits
Business Continuity Planning


Identity and Access Management
SSO, managing and tracking access, adhering to minimum necessary access which is a HIPAA requirement.
Single Sign On
HIPAA Compliance
Access Tracking and Management

Technical and Software Solutions
Feature AWS, security automation.
Cloud architecture
AWS
Security Automation
Compliance and Regulatory Frameworks
Support compliance programs, help establish compliance programs, help evaluate wether you’re currently compliant, recommend solutions to make you compliant, help achieve compliance
Policies and Procedures
Gap Analysis
Risk Assessment


Training and Planning
Incident response, risk assessment, gap analysis, disaster recovery, business continuity planning
Incident Response and disataser recovery
Security Control Audits
Business Continuity Planning
Identity and Access Management
SSO, managing and tracking access, adhering to minimum necessary access which is a HIPAA requirement.
Single Sign On
HIPAA Compliance
Access Tracking and Management

Services for Your Business

Small Business
Strengthen your defenses with compliance and data security solutions that fit your company culture. Focus your investments of time and money in data security architecture, policies and procedures, data management, risk assessment, and training that protect the health of your business and work within your current internal structure.
Health Practices
Safeguarding Client Confidentiality for Counselors, Psychologists, and Practices of All Sizes

HIPAA/HITECH Compliance

Policy Templates

Compliance Software Solutions
Small Businesses
Securing your business, from lawyers and boutique law firms to financial advisors to legal and mental health startups
Technical Review of Security Requirements
Risk Assessments
Regulatory Gap Analysis
Software Teams
Protecting Innovative Ideas and Sensitive Data for Startups and Business Associates
Cloud Security and Architecture
Security Automation
Identity & Access Management
Non-Profits
Defending the Integrity of Legal and Mental Health Non-Profits
x
x
x