Data Security

Threat Assessment     Penetration Testing     Regulatory Audits     Security Policy

We're on the front line in the fight against disruptions, breaches and malicious attacks.


What We Do:

We help you identify your most important and most vulnerable assets, and protect those assets first. This approach acknowledges different priorities in every organization. It takes into account that different circumstances create different kinds of threats.

We also believe this approach allocates time and money in the wisest way.

We speak plain English, and we educate our clients. We share what we know with you, and help you learn about your system vulnerabilities in basic terms.  We open the door for you to become an informed participant in your own security.

We offer both prevention and restoration.  System audits and protective measures; and incident response, restoring operations and recovering data after a disruption.

We acknowledge current reality – malware is ubiquitous in the world’s networks. Building a moat around your castle is yesterday's technique. We endorse new methods that create a “wellness program” for your systems.

Preventive Services:

  • Threat Assessments
  • Penetration Testing
  • Multifactor Authentication
  • Encryption Management
  • Regulatory Audits: Payment Card Industry, HIPAA, FFIEC
  • ISO 22301 and ISO 27001 Consulting
  • Business Continuity Planning/ Disaster Planning

Restorative and Recovery Services:

  • Incident response
  • Data recovery
  • Digital forensics
  • Evidence preservation

Some Examples From Our Files:

  • An IT director discovered a former employee was still present in the system, presenting a security threat. Data Clone Labs altered employee access and deployed multi-factor authentication.
  • A disgruntled service provider took "revenge" by making company files inaccessible. Data Clone Labs worked around the clock (and through the weekend) to restore access.
  • A sales manager in Nevada was worried about intellectual property theft as his staff traveled abroad – especially in China. Data Clone Labs secured the company’s mobile devices and internal communications.
  • A manufacturer with federal government contracts needed to demonstrate supply-chain security.  Data Clone Labs guided the company to an ISO 27000 audit and registration.
  • A global company (USA, South America, China, Europe) was victimized by bank account takeover attacks. Data Clone Labs developed a strategy to counter the attacks and limit financial loss.

Listen to The CyberJungle Podcast



Oval 15 + Datto_Logo
Oval 17 + Dell_SonicWALL_Logo
Oval 11 + blue-sophos-logo
Oval 12 + Yubico_Logo
Oval 13 + MiToken_Logo
Oval 14 + GFI_Logo