IST Data Security

IST Data Security

As the technology world grows more advanced and sophisticated so do cybercriminals. They have raised the ‘professionalism’ of their business and amplified the scale of cybercrime to unprecedented levels. Threats to control systems can come from numerous sources but to protect against malicious attacks it is necessary to create a secure cyber-barrier. 

 

Staying ahead of this threat is a hard game to play but IST plays it hard and plays it well. Because IST’s security culture places a premium on data integrity, our clients can feel secure that we are ever vigilant against breaches of any sort. IST is a SOC2 Type 2 organization, with rigid ISO Policies in place, dedicated to adhering to stringent administrative, physical and technical safeguard standards all working in synchrony to give our clients peace of mind as their data leaves their offices.

Security Features

IST Consulting
Data Encryption

Files are encrypted in transit and at rest on certified media.

IST Vendor Management

Data Center

N+1 state-of-the-art, fully redundant data center.

IST Consulting
Physical Security

Single point of entry, coded key cards, biometric fingerprint and iris scanners, on-site security force and surveillance cameras.

IST Vendor Management

Separation of Information

Information and access is kept separated across hardware, engineers and support staff.

IST Consulting
Prohibited Removal Media

VPN and active directory controls use two-factor VPN authentication to prohibit removable media from access storage.

IST Vendor Management

Employee Background Checks

All employees undergo extensive background checks including financial, criminal, drug ID and finger printing.

IST Consulting
Ethical Walls

User and group based ethical walls security for access rights and permissions to documents.

IST Vendor Management

Network Security

Adhere to the highest security principals and disciplines, validated by our annual PEN test and SOC 2 Type 2 Audit.

Digital Encryption and Security Compliance

Latest Insights

The Method, the Playbook, and the War Room: How Creativity Drives Customer Service in IT
By Brad Burgess December 12, 2025
In this episode of Outside-IN, we are talking with Ted Korba, Senior Director of IT Services, about how IT Service Management (ITSM)—including problem, change, and incident management—serves as a necessary "playbook" to bring "a method to the madness" in today’s chaotic, technology-heavy corporate world.
swirling green digital data
By IST Discover-E November 21, 2025
Global investment in eDiscovery is accelerating, with total market value expected to exceed $27 billion by 2030. Growth is being driven by the rapid adoption of AI-powered analytics and cloud-based infrastructure, and teams positioning themselves to lead are transforming review speed, cost models, and defensibility for
Outside In Podcast presented by IST: Mail Security Strategy
By Brad Burgess November 3, 2025
Tune in to the Outside-IN podcast to hear Charles Riddervold, National Director of Operations and Proposal Strategy, who began his career in mail security nearly 40 years ago while screening packages for soldiers in the Army.
Show More