The Onakee Group
01

Encryption

At least 46 states including early pioneer California (SB 1386) have security breach notification laws that legislate cybersecurity and discourage mishandling of unencrypted, personally identifiable information on computer networks.

02

Access Control

Access control is a process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).

03

Test

Sophisticated intruders can bypass perimeter defenses to perpetrate attacks that are highly targeted and difficult to detect. Continually updating and assessing the adequacy of a firm’s cybersecurity posture is imperative.