IT Regulation Compliance
Salos Technical Services provides physical and software security solutions and we assure your compliance with IT regulations, application security, data encryption, data transmission, digital identity management and assigned privileges by offering vetted tools for network security. These tools include security integration solutions for authentication, authorization, and access control as well as malicious software prevention. We will deliver security and compliance training for your company’s management and personnel. In every aspect of our consulting we implement the following best practices:Information Systems Audit and Control Association / IT Governance Institute (ISACA/ITGI)
We implement best practices to protect your process control management and the technology used in your business processes conforms to the recommendations of CobiT and ISO 17788.
Control Objectives for Information and Related Technologies (CobiT)
We use the process standard recommended by the Public Company Accounting Oversight Board. We make sure your process control and management is compliant with Sarbanes-Oxley (SOX). This requires an annual assessment of effective internal control over your financial reporting for independent audits.
National Institute of Standards and Technology Security Publications (NIST SP 800)
We implement technology and business processes in IT security as recommended by FISMA and FIPS standards.
The Committee of Sponsoring Organizations (COSO)
We implement the processes of enterprise risk management used by the PCAOB as a guide for SOX.
International Organization for Standardization (ISO 17799)
We create IT security programs, specifically for financial services, according to the guidelines of ISO 17799. We keep you compliant with IT regulations; enforced by SOX, Bank Secrecy Act (BSA), and USA PATRIOT Act: governing your financial reporting and preventing money laundering. If you are a financial institution, we ensure best practices protecting the privacy and security of individual identifiable financial information that you may be collecting, holding, and processing as required by GLBA. If you are in the health care business, we ensure best practices protecting electronic health information being gathered by your IT processes as required by the Health Insurance Portability and Accountability Act (HIPAA).