Our Standard Analysis will include:
Grounds, and building layout, perimeters, utilities, physical layout, lighting, telecommunications, all points of entry and egress. ID Badge and Identification Systems, vehicle access, any high points of risk that you may identify, security guard service, security monitoring service, security alarm system, building hardware and key control.
To conduct a comprehensive survey several points that must be identified to us are:
Location of your check writing equipment, Mail room, Mail reception and sorting areas We will need to know the exact property boundary.
A sited plan of a minimum of ground floor or any level that has ground access.
We will need to have access to the property and be able to see everything. We will need an escort and access to the building at night and on weekends as well as business hours.
Additional Analysis that is available:
Evaluation of existing response and disaster plan.
Telecommunications Analysis
Telephone system, facsimile system, inter-comm system, TSCM (Debugging) recommendations, control of access to the communications systems and protection in general. Commercial Technical Countermeasures conducted will be a radio frequency analysis, telephone analysis, telephone line analysis, carrier current analysis, and a physical search. The telephones and lines will be analyzed by performing 27 different test.
Proprietary Information protection
Data Security Policy, general information policy and awareness.
Comprehensive Information Technology Analysis
This is a survey of your IT program, policy and contingency plans. Facility will be examined for the presence of unauthorized recording or transmitting equipment. Report will point out the most common areas that easy compromise could come from and how to stop it.
A basic TSCM inspection involves the following steps: The visual inspection of the areas and inspection of the r.f. spectrum and the power circuits in the individual rooms using a TF-8500 receiver, FDL spectrum analyzer, carrier current analyzer, RF Receiver, Frequency counter, Microwave analyzer, 4 and 5G Analyzers, WiFi and Video Detection, electromagnetic pulse detector, and Spectrum Analyzer.
Establish a listening point outside of your facility to determine if there are any radio frequency devices transmitting out of your building.
Counter measures are performed by experienced professionals using the industry excepted and certified counter measure equipment and ATAB and ISATP Certified Technicians.
Computer Vulnerability tests.
Actual hands on testing of your system to determine if your are currently compromised and also to determine if you system can withstand an outside attack from professional hackers. We will be looking for switches, sniffers, Trojan horses, logic bombs, virus/worms, service denial, login and password compromises and physical invasion.
HIPPA Compliance Survey
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires the Department of Health and Human Services (HHS) to adopt national standards for electronic health care transactions.
The law also required security and privacy standards in order to protect personal health information. IDRC has developed a program to audit your compliance with and assist you with the following regulations:
Under HIPAA, most health plans, health care clearinghouses and health care providers who engage in certain electronic transactions have only until October 2002 to implement each set of final standards.