Keep track of who has access and at what level to all software and IT systems in the company. Audit annually and when changes occur, new hire, leaving company etc.
Template for Data Breach/Incident Response Policy.
Used to report cyber security incidents for all employees.
A company password policy that can be used containing all the best practices for creating passwords.
Cyber Security Plan to achieve CMMC 2.0 Level 1. This is a requirement for government contractors.
IT device inventory includes computers, desktops, laptops, phones (work and personal), printers, and other devices that use the company networks.
A test template with protected google doc.
Subscribe to our weekly newsletter to get actionable insights and tasks to grow your business.