Organizational Security
-
Information Security Program
We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.
-
Security Awareness Training
Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
-
Security Awareness Training
Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
Cloud Security
-
Encryption at Rest
All databases are encrypted at rest.
-
Vulnerability Scanning
We perform vulnerability scanning and actively monitor for threats.
-
Business Continuity and Disaster Recovery
We use data hosting providers to backup services reducing any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
Access Security
-
Permissions and Authentication
Access to cloud infrastructure and other sensitive tools are limited to authorized employees who require it for their role.
Where available we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected. -
Password Requirements
All team members are required to adhere to a minimum set of password requirements and complexity for access.
-
Password Managers
All company issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
Contact Us
If you have any questions, comments or concerns or if you wish to report a potential security issue, please contact security@tlitpro.com.