Menu Close
Threat Monitoring
Our staff proactively monitors the applications we develop and support for suspicious activity. We perform penetration testing and analyze results from testing reports. Our staff participate in discussions about what requires remediation based upon severity level and/or determined if an issue belongs to another area. We leverage the results to perform mitigation work. To effectively perform our assigned tasks, our personnel are trained in, and are aware, of applicable laws, guidelines, and regulations, especially those for medical data (i.e. Personally Identifiable Information (PII)).