How It Works
You’ll designate one member of your team as your security officer. ___________________________________ We’ll guide that person through a 30-45 minute questionnaire or interview and direct some questions to your IT provider. If you do not have an IT provider we will help set you up with a qualified IT specialist. ___________________________________ That’s it. We’ll use the information gathered to provide you with an expert Risk Assessment and your written Information Security Plan. You and your team will use these documents and recommendations to make decisions about policy and controls going forward.
|