Usherwood Trust Center
Usherwood Office Technology is committed to ensuring the confidentiality, integrity, and availability of your data. Here is how we protect information and comply with industry standards and regulations.
Compliance
Monitoring
Continuously monitored by Secureframe
Usherwood's Security Posture
Organizational Security
Information Security Program
- We have an Information Security Program in place that is communicated throughout the organization. Usherwood is committed to maintaining the highest standards of security, availability, processing integrity, confidentiality, and privacy.
- Our Information Security Program follows the criteria set forth by the SOC 2 Framework.
Third-Party Audits
- We undergo independent third-party assessments to test our security and compliance controls.
Third-Party Penetration Testing
- We perform annual independent third-party penetration tests.
Roles and Responsibilities
- Security roles and responsibilities are well defined and documented.
Security Awareness Training
- Employees go through regular security awareness training on industry standards, phishing, and password management.
Background Checks
- We perform background checks on all new team members in accordance with local laws.
Cloud Security
We rely on Microsoft Azure infrastructure for network security and data hosting. More info: Microsoft Azure
Encryption in Transit
- All applications encrypt data in transit using TLS/SSL only.
Vulnerability Scanning
- We perform vulnerability scanning and actively monitor for threats.
Logging and Monitoring
- We monitor our cloud services and log various cloud activities.
Business Continuity and Disaster Recovery
- We use our hosting provider’s backup services and monitoring tools to reduce the risk of data loss and alert us to failures.
Incident Response
We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.
Access Security
Permissions and Authentication
- Access to cloud infrastructure and other sensitive tools are limited to authorized employees who require it for their role.
- Where available we have Single Sign-on (SSO), 2-factor authentication (2FA) and strong password policies to ensure access to cloud services are protected.
Least Privilege Access Control
- We follow the principle of least privilege with respect to identity and access management.
Quarterly Access Reviews
- We perform quarterly access reviews of all team members with access to sensitive systems.
Password Requirements
- Our password requirements are established based on the most recent guidance from security compliance professionals.
Password Managers
- All company issued laptops utilize a password manager for team members to manage passwords and maintain password complexity.
Vendor and Risk Management
Annual Risk Assessments
- We undergo at least annual risk assessments to identify any potential threats, including considerations for fraud.
Vendor Risk Management
- Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.