img img
Security On Call
Contact Us
(775) 337-8142

Click here to e-mail us
Try Skip the Manual
Interested in one our services that requires set-up and in a hurry? Skip the Manual™ and
let us do the set-up for you!
Professional Security Team on Call

Security on Call™ is a team of information security experts who exist outside your four walls, not on your payroll. We provide professional security services on demand.

Information Security regulations are being enforced with increased vigor. Lawsuits and settlements arising from data leaks are also increasing. The best way to minimize your liability is to have expert son your side. Security on Call™ is your on-demand security team.

Many organizations today face litigation, malicious actions, ineffective policies or audit trails, and an executive staff that is flooded with confusing legislation, litigation, and contractual mandates. Data Clone Labs can help organizations that face regulations and mandates like:

- Federal Rules of Civil Procedure (FRCP), eDiscovery and information forensics for organizations in litigation

- Family Educational Rights and Privacy Act (FERPA) for student and related financial data

- The Gramm-Leach-Bliley Act (GLBA) for financial data

- Health Information Portability and Accountability Act (HIPAA) for health data

- International Standards Organizations 27k Standard for Information Security

- National Association of Stock Dealers / Security and Exchange Commission data rules for financial advisors and broker/dealer data

- Payment Card Industry (PCI) for merchant and processor credit card data

- Sarbanes-Oxley Act for publicly traded companies

- State Security Disclosure Laws for consumer data


 Web Application Scanning

70% of all web apps are unsecured and open for attacks

Is your web app one of them?

Our web application vulnerability scanning conducts automated searches for security weaknesses in web applications and produces a detailed security report with recommendations for optimally matched solutions.

Our scans identify application vulnerabilities ( e.g. Cross Site Scripting (XSS), SQL injection, Code Inclusion etc.. ) as well as site exposure risk, ranks threat priority, produces highly graphical, intuitive HTML reports, and indicates site security posture by vulnerabilities and threat exposure.

Firewall is not enough to protect your website against application vulnerabilities. Our web application assessments is a SaaS (software-as-a-service), so you don't need to change your server, add software or hardware to protect your business from interuption from web drive-by downloads.


 The Following Security on Call™ Services Are Also Available

* Evaluation of your organization's security policies and procedures

* eMail archiving and document retention

* Information security audits, risk assessments, and compliance audits including ISO 27k internal audits

* Penetration testing of your internal, external and DMZ network. We will analyze and help you understand the results and develop procedures to evaluate and mitigate identified vulnerabilities /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> .

* Disaster recovery and continuity of operations planning

* Endpoint security and auditing

* Log and email archiving planning

* Securing your Voice over IP systems

* Privacy and compliance for mobile computing, lap-tops, smart phones and PDAs and secure data and secure synchronization

* Training your staff on security, privacy and your policies

* Documentation for demonstrating compliance and prudent efforts

* A trained second opinion on your existing systems and procedures from a Certified Information Security Professional

Find out more by contacting us....


LendingTree sued by victims of ID theft, plantiff's seek class-action status. 

More info: c|net Security Blog by Elinor Mills

img img