Indicator of compromise assessment - Shaw and Partners

Cybersecurity
Services

We offer a comprehensive and customizable suite of information technology security services to help your organization better understand risks, identify maturity targets, perform activity-based cybermaturity assessments, ascertain how your current state measures up to the desired state, and respond to breaches.

Our
Breadth Of Services
Include

What measures do
we take to protect
your data?

Data Centers

We co-locate servers in a cloud based architecture with Google Cloud and Amazon Web Services (AWS). Environments are constantly updated and patched.

Major cloud platforms also provide us some extra benefits in implementation of security best practices like hardware lifecycle management, physical security, and network infrastructure.

Encouraging Best Coding Practices

We maintain best practices on the backend to ensure accounts remain secure. We monitor sessions to restrict account access appropriately and construct products in a way that not only is every client isolated, every client's client is isolated too.

Besides safeguards to detect and stop common attacks, such as SQL injection and cross-site scripting, we actively review our code for potential security concerns.

Continuous deployment systems and development processes allow us to rapidly update and patch systems whenever needed.

Backup Policy/Business Continuity

We continuously replicate (backup in real time) data between multiple servers hosted by our primary service provider AWS. Additionally, data is also replicated to Google Cloud (our secondary platform) in real time. Fail-overs occur autonomously from primary to secondary platforms.

We also take snapshots of data every hour. Each snapshot is stored for 30 days in the cloud environment.

Network Security

We use AWS Shield for protection against potential DDoS (denial of service) attacks.

Access is configured to allow the minimum level of access needed to maintain them. All unnecessary users, protocols, and ports are disabled and monitored.

Our staff is able to access the servers only through a Virtual Private Network using a 2048-bit encrypted connection with private keys.

GDPR Compliance

We can ensure software compliance with the European Union’s General Data Protection Regulation (GDPR), the data protection law that took effect on May 25, 2018.

Account Security

All information shared with Shaw and Partners is automatically encrypted, including your email and password.

Customizable Security Options

We help create the perfect security controls for your needs. You can request specific security settings for your application's needs.

Benefits of
Working
with Us

GET IN TOUCH


TELL US WHAT YOU NEED

cybersecurity@shawandpartners.com
2020 © All rights reserved. Shaw and Partners