t88AblpoA8.jpg

Cyber Security

Safeguarding Our Clients from Cyber Security Threats

Your OneSource Solution takes safeguarding your employees seriously.

Today’s world — often referred to as the “information age”— has seen people generate, store and exchange information at an unparalleled rate of frequency and volume.

We believe effective data security starts with employee awareness, training and risk assessment.

  • Information security constitutes a significant investment--from training our people to ensuring the right mix of systems and operational controls are in place to ensure protection.
     

  • Our team members are regularly trained and are made aware of security practices and privacy-related regulations. Our software developers are also required to take additional courses related to creating secure application programs.

8LNBVe1GZ4.jpg

  • Our technology team has implemented its own internal phishing testing and awareness campaign to measure and benchmark employee awareness to suspicious emails.
     

  • Cybersecurity incident response is one part of our disaster recovery testing in which our team members participate.
     

  • Analyzing risk is a critical first step--from rating and performing due diligence on third party vendors to reviewing safety, privacy and general compliance issues we make risk assessment and mitigation a priority.

We invest in technologies that secure our environment.

  • We utilize commercial network perimeter security devices to secure our network.
     

  • We continuously deploy software programs that detect attack patterns, respond immediately, and alert IT personnel. These intrustion-detection and prevention solutions are in addition to anti-spam, anti-advertisement and anti-virus solutions.

AWFHAG8NOn.jpg

  • We subscribe to alert services such as USCERT the U.S. homeland security email alerts, as well as other sources to monitor developing security threats, trends, and known new weaknesses.
     

  • Encryption technologies are utilized to protect data "in flight" and "at rest."
     

  • Remote access capabilities utilized by employees require dual factor authentication to access internal systems.