Implementation & Remediation

Preparing to meet your regulatory compliance guidelines doesn't need to be difficult.  Title agents, settlement service providers, and third party venders can pick and choose from any of the following assessment, implementation, and remediation services.


Auditor’s Notebook

  • Prepare & organize compliance documentation
  • Review existing policies (if any), identify weakness, assist with the creation of new policies specific to the unique requirements of each agent
  • Third party vendor education & documentation
  • Staff background & credit checks
  • Cyber liability insurance consulting
  • Mock audit & reporting


Physical Security

  • Audit of physical office environment (points of ingress / egress, storage, access control)
  • Employee & common area review
  • Assessment of physical NPI security
  • Identify gaps and areas of improvement
  • Recommend vendors (IE: shredding companies, alarm companies & service providers)
  • Manage third party vendors


Data Security

  • Audit existing data security initiatives
  • Encryption services:  Servers, Workstations, Laptops, Mobile Devices
  • Secure Email offering
  • Website vulnerability review
  • Mobile device management
  • Biometric logon options
  • Penetration Testing


Network Security

  • Vulnerability Assessment
  • Implement solutions:  Managed Firewall, Intrusion Detection, AD Group Policy Objects
  • Ongoing monitoring (firewall, IDS, anti-virus)
  • System event log review (audit, identify issues, continued monitoring)
  • Password policy implementation
  • Network device configuration auditing


Disaster Recovery Consulting

  • Audit existing Disaster Recovery & Business Continuity Plans
  • Establish recovery time objectives per business goals
  • Implement disaster recovery & BCO Plan designed specifically for clients unique needs including:
  • Recovery time objective
  • Information systems
  • Physical systems
  • Employee access
  • Contingency plans for:  Fire, Flood, Employee Sabotage, Data Loss, Pandemic, etc.


Disaster Recovery & Business Continuity Solutions

  • VMware based, encrypted server imaging IE: onsite encrypted appliance
  • Offsite data vaulting (dual location)
  • Backup monitoring & integrity verification
  • Custom data-center based “hot failover sites”
  • Workstation file backup & restoration
  • SSAE-16 certified solutions


Education & Training

  • Provide “real world” scenario based management & staff training
  • Social engineering awareness
  • Safe & responsible computing
  • Document destruction
  • IT asset disposal
  • Clean Desk & other premise based best-practice review


Maintenance & Monitoring Services

  • Remediate environment
  • Virus / Malware detection & removal
  • Security patch management
  • Managed firewall monitoring
  • Server monitoring
  • Device event log review
  • Active intrusion detection & response
  • Malicious web content blocking
  • Ensure ongoing compliance