Whatever your current security stance is, we are ready to assist you. Your data is every bit as secure with your Cover Operation team as it is with a team in your domestic office; even more secure. Cover Operation has established 4 ways to protect your company: Training and Culture, Physical Protection, Technology Protection and Network Security.
Training and Culture
- All our staff are required to abide by privacy agreements, lawfully.
- A well-established training and examination system for staff has already built a new office culture, in which people understand they should never use cellphones or cameras inside an office workplace or talk about client issues outside the team.
- Only permitted key staff members can hold login information for the whole team.
- Most importantly, employees should be cautious of outside links from email: they are not allowed to visit.
Physical Protection
- Our service delivery center is under the protection of security personnel 24 hours X 365 days.
- Only our employees with smart cards, and registered visitors with temporary smart cards are allowed to enter our office.
- To protect important data, employees are not allowed to use any flash drives or mobile hard drives.
- The video monitoring system works all day and night, can alarm and guard personnel when an entry happens at an abnormal time.
Technology Protection
- PCs are equipped with network servers and windows logins, then PCs are secured by username and password.
- Applications in all PCs are fully controlled and audited. Employees are forbidden to install any personal programs.
- All actions on the system, internet and 96% non-work-related webpage operations are monitored and audited. Downloading and uploading data is banned on office PCs, data exchanged is temporarily saved in a data base for 60 days.
- According to staff classification and client management regulations, we set up internal drive visit restrictions. Employees only have access to their client servicing information.
Training and Culture
- Implemented fixed IP accessible permit can ensure a connection will never happen outside our office.
- In order to protect mission critical systems and data, ensure secure access and enhance privacy, a secure IPsec VPN Network connection is implemented.
- For clients who have additional security requirements, turning on a time-limited accessible function of workstations to eliminate illicit access out of working times.
- Latest anti-virus software, data security tools, anti-phishing programs, URL filter program and spam blockers are installed to protect workstations, server and networks.