IT infrastructure
Secure client login
Firewall defenses
Anti-virus or spam or spyware manager
Daily server backup
Continuously monitored web-access
Background check of employees
Dedicated IT team
Data confidentiality
Employees sign an NDA as part of the hiring process
Limited internet access (unless there’s a process requirement)
Continuously monitored web-access
Disabled USB ports
Physical security
Biometric systems
Closed-circuit television cameras
Clear desk policies