This month’s customer satisfaction score: 98.01%

“Mark is wonderful to work with. He never makes me feel like anything I ask him is silly. He takes the time to help me understand what caused the issue. It is obvious he truly likes what he does and likes working with people. He’s a jewel.”

THE CRC

Compliance and Risk Controls

The CRC is i2m’s flagship security product. It is a unique approach to your IT security and compliance needs. The CRC helps you meet those needs, while providing evidence and frameworks for your clients, funders, and auditors. This independently confirms your commitment to the security of your internal data, and any data with which you have been entrusted.

Developed over several years of real-world IT security work with our clients, the CRC combines:

· Best-in-class technology tools to help you fill gaps in your security footprint, along with the experience to ensure successful implementations.
· Automated scans and evidence collection.
· A library of proven templates to help you quickly build your own policies and procedures.
· Client-accessible tools that provide a clear picture of your security stance.
· Assessment tools to help manage the security footprint of your vendors and of critical software systems you use.

We use all of this to give a full picture of your security stance and provide a roadmap towards compliance.

TIPS FROM OUR SECURITY TEAM

MALICIOUS QR CODES

In January 2022, the FBI warned that cybercriminals increasingly use QR codes to steal credentials and financial information. Cybercriminals often bypass security features by embedding QR codes in email attachments. So, be wary of anyone asking for secure information via a QR code link!