Legal
Security Statement
Last updated: January 1, 2024
Our Commitment to Security
At Top IT Advising, security is not just a service we provide—it's fundamental to how we operate. We are committed to maintaining the highest standards of information security to protect our clients' data and our own operations.
Security Framework
Our security program is built on industry-leading frameworks and standards:
- ISO 27001 Information Security Management System
- SOC 2 Type II compliance for security and availability
- NIST Cybersecurity Framework
- GDPR compliance for data protection
Data Protection
Encryption
We protect data through comprehensive encryption:
- Data in transit: TLS 1.3 encryption for all communications
- Data at rest: AES-256 encryption for stored data
- Database encryption with key management systems
- End-to-end encryption for sensitive communications
Access Controls
We implement strict access controls:
- Multi-factor authentication for all systems
- Role-based access control (RBAC)
- Principle of least privilege
- Regular access reviews and deprovisioning
Infrastructure Security
Network Security
Our network infrastructure includes:
- Next-generation firewalls with intrusion prevention
- Network segmentation and micro-segmentation
- DDoS protection and mitigation
- Continuous network monitoring and threat detection
Cloud Security
We leverage cloud-native security controls:
- Cloud Security Posture Management (CSPM)
- Container and serverless security
- Identity and Access Management (IAM)
- Cloud workload protection platforms
Operational Security
Security Operations Center (SOC)
Our 24/7 SOC provides:
- Continuous security monitoring and alerting
- Threat hunting and incident response
- Security information and event management (SIEM)
- Automated threat detection and response
Incident Response
Our incident response capabilities include:
- Documented incident response procedures
- 24/7 incident response team availability
- Forensic analysis and evidence preservation
- Post-incident review and improvement processes
Compliance and Auditing
Regular Audits
We undergo regular security audits:
- Annual SOC 2 Type II audits
- ISO 27001 certification audits
- Penetration testing and vulnerability assessments
- Internal security assessments and reviews
Compliance Monitoring
We maintain compliance through:
- Continuous compliance monitoring
- Policy and procedure updates
- Staff training and awareness programs
- Third-party risk assessments
Employee Security
Background Checks
All employees undergo comprehensive background checks including:
- Criminal background verification
- Employment history verification
- Education and certification verification
- Reference checks
Security Training
Our security awareness program includes:
- Initial security orientation for new employees
- Regular security awareness training
- Phishing simulation exercises
- Role-specific security training
Business Continuity
Disaster Recovery
Our disaster recovery plan includes:
- Regular data backups with offsite storage
- Redundant systems and failover capabilities
- Recovery time objectives (RTO) and recovery point objectives (RPO)
- Regular disaster recovery testing
Business Continuity Planning
We maintain comprehensive business continuity plans:
- Risk assessments and business impact analysis
- Alternative work arrangements and remote capabilities
- Communication plans and procedures
- Regular plan testing and updates
Vendor and Third-Party Security
We carefully evaluate and monitor our vendors:
- Security assessments for all vendors
- Contractual security requirements
- Regular vendor security reviews
- Incident notification requirements
Reporting Security Issues
If you discover a security vulnerability or have security concerns, please report them immediately to our security team:
- Email: security@topitadvising.com
- Phone: +1 (555) 123-4567 (24/7 security hotline)
- Encrypted communication available upon request
Contact Information
For questions about our security practices:
- Chief Information Security Officer: ciso@topitadvising.com
- Data Protection Officer: dpo@topitadvising.com
- General inquiries: security@topitadvising.com