Click-to-call 810-547-1349

Latitude Information Security

Industries Served:
, , ,
Company Categorized in:
,

ADDRESS & CONTACT


Address

736 Springdale Drive, Exton, PA 19341

GPS

40.029176821165, -75.605373732124

Telephone


OPENING HOURS

Protect your sensitive data. Protect your organization.

Bolster your security program by engaging with a partner that is willing to take the time to get to know your organization rather than offering a basic “one size fits all” approach. Our seasoned, certified professionals are highly accomplished at building security programs, assessing compliance, and managing risk – all tailored to your organization’s needs.

Security Risk Assessments: Security Risk Analysis that meets requirements for HIPAA, HITECH, Meaningful Use, and OCR Audit Protocol. Detailed analysis of physical, administrative, and technical controls presented in a format that is objective, comprehensive, and actionable.

Penetration Tests: Proper and thorough penetration testing is vital to an organization’s security program; Latitude’s penetration testing services provide our clients with the detailed insights needed to proactively mitigate vulnerabilities before they can be exploited by malicious attackers.

Third Party Risk Management: When onboarding a vendor or third party a thorough assessment of that organization’s security posture is a must. Exploitation of third party vulnerabilities is not only common but can be extremely damaging. Latitude’s management and performance of third party risk assessments ensure that your organization is protected.

Social Engineering: Test and educate the greatest threat to cybersecurity – the human being. Phishing and vishing campaigns designed to meet specific customer needs; focused surveys to identify causal factors in falling prey to these attacks.

Tabletop Exercises: Put your incident response capabilities to the test with realistic scenarios tailored to your organization.

Compliance Support: Latitude has extensive experience assessing organization’s security program against numerous frameworks and standards such as HITRUST, NIST 800-171, SOC2, ISO27K or CMMC. Regardless of the framework, we can help you create a plan that is tailored to your organization’s goals.

Business Impact Analysis: Identify maximum tolerable downtimes, resource requirements, system dependencies, and data flows through in-depth discovery with Business and IT Owners of each system. Validate assumptions inherent in Business Continuity, Disaster Recovery, and Backup Plans. Performed per NIST SP 800-34 and DRII standards.

Security Program Assessments: Latitude works with our clients to assess their security programs and identify vulnerabilities. These assessments are used for Board of Director reviews, Grant programs, and funding justification. Our unique process allows us to identify and prioritize issues clients have and help them resolve in a timely and cost effective manner.

LOCATION ON MAP

CONTACT COMPANY

Can’t Find What You’re Looking For?