To ensure the protection of sensitive information and systems, access controls like password policies and two-factor authentication are essential. At Growthable, we use 1password for storing sensitive access credentials and enforce 2FA/MFA, as well as logins via Google OAuth2.0. Moreover, employees’ MacBooks are secured with face and biometric policies.
Incident Response Plan:
We have an incident response plan in place, which we regularly test to respond quickly and effectively to cyber incidents, minimizing potential damage.
Other Security Measures:
We also employ the following security controls to manage and control potential threats:
To reduce the attack surface, we regularly identify and patch vulnerabilities.
Security Awareness Training:
Employees receive security awareness training to help them identify and report potential security threats.
Regular Security Assessments:
We regularly conduct security assessments and penetration testing to identify potential vulnerabilities and improve our overall security posture.
We regularly backup important data to help us recover from a security incident or data loss.
Risk Assessment and Management:
We regularly conduct risk assessments to identify potential threats and vulnerabilities and implement controls to manage those risks.
We ensure that the organization complies with relevant industry-specific regulations or standards such as HIPAA, SOC2, PCI-DSS, GDPR, etc., where necessary.