Security is an extremely important subject, especially in the cyber war era that is today.
We continuously see the news about security breaches at various companies and organizations with compromised data for
millions of customers and members. We hear of, what it seems like thousands of lone "hackers", "cyber criminal" organizations, and even
country-backed teams of "cyber soldiers" whose intent it is to penetrate network and security defenses of companies
and government organizations in order to extract information, steal money, disrupt and damage operations, make
political or other statements, or simply "for fun".
That is why for every project we work on, security is one of our primary targets. In addition to providing your
organization a solution or a service that would help to fulfill its purpose or business goal, we want to make
sure that no one can exploit that solution or service with any intent or purpose, whether it is malicious or not.
We ensure that any solution that is provided is secured in a multitude of ways, from authentication of users to ensure that
only approved individuals access that solution, to authorization to ensure that once having access to the solution,
authenticated users can only perform operations that they have been explicitely allowed to do. Securing a solution
includes transport security, where all communications are protected with the latest and best encryption, as well as
that communications are authorized via signatures to ensure that both, sender and receiver are legitimate and
who they state they are. Securing a solution also includes encryption of stored data at rest and other backend information,
if it includes protected or restricted data such as personal, financial, and other sensitive information.
Working with various healthcare, financial, government, and membership-driven organization, we have become very familiar
with various laws and regulations governing electronic information and data protection such as HIPAA, FCRA, and others, and
have developed numerous solutions to support these regulations. Your organization's solution may be different and unique
to your situation, and we will work with you to design an appropriate solution that will fit your needs.