Keeping personal data secure

During Cybersecurity Awareness Month, which is every October, you see a ton of messages telling you how to safeguard your data.

You get reminders on password complexity, safeguarding your documents, the importance of MFA, and many other aspects of securing your information.

But IT consultants like you are often submitting personal data to IT staffing firms like us, and you may wonder just how serious we are about keeping your personal data safe.

The short answer is: Very.

Our internal LRS IT Department follows strict policies and procedures to evaluate security implications and enforce best practices for all employees, systems, and applications. Their efforts are focused on following a Zero Trust framework using layered technology elements such as Identity, Data Protection, Threat Protection, Application Security, Endpoint Management, Infrastructure, and network security with auditing and monitoring capabilities throughout.

Identity and Access management systems are critical components to any enterprise security design. LRS utilizes Azure Active Directory combined with on-premise Active Directory as our primary identity provider. These technologies allow LRS to securely authenticate users, devices, applications, and processes before granting authorization to access resources.

LRS employees are required to create strong network passwords, but our IT Department goes beyond passwords to authenticate users. Numerical PINs are alternatives to passwords, and we also rely on multifactor authentication to identify users connecting to our network using a smartphone or other mobile device.

We encourage employees to use data protection technology that enables them to classify files and emails as Personal, Private, Confidential, or Highly Confidential. Classification based on data sensitivity not only ensures that information is not unnecessarily exposed to unauthorized individuals, but also applies an appropriate level of encryption to preserve its confidentiality.

Speaking of encryption, we employ hardware level disk encryption, Virtual Machine encryption, backup encryption, database encryption, and files protected by either passwords or public and private keys.

LRS also has extensive defenses against cyber attacks. We use the threat management capabilities of our security software to detect and investigate suspicious login. We also have anti-virus, vulnerability management, and attack surface reduction capabilities that alert IT security personnel of potential endpoint intrusions.

We have next-generation protection for emerging threats, endpoint detection and response (EDR), and potentially unwanted program (PUP) detection to ensure the integrity of LRS devices and data.

Rest assured that the personal data you send to LRS Consulting Services, including your resume, is kept safe. We are very serious about data security all year long, not just during Cybersecurity Awareness Month.