top of page

How We Handle Cyber Security Best Practices

Data at Rest

Tabernacle Technology Solutions ensures that all datastores containing customer data, including S3 buckets, are encrypted at rest.

​

​

​

​

​

​

​

​

​

​

Data in Transit

We use TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. To maximize the security of our data in transit, we also utilize features such as HSTS (HTTP Strict Transport Security). 

​

​

​

​

​

​

​

​

​

​

​

​

​

Penetration Testing

Tabernacle Technology Solutions engages penetration testing firms at least annually to test our security methodologies.

​

​

​

​

​

​

​

​

​

​

​

​

​

Security Education

We provide comprehensive security training to all employees upon onboarding and annually through educational modules within our own platform. Our security team shares regular threat briefings with employees to inform them of important security and safety-related updates.

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

 

Vulnerability Scanning and Secure Remote Access.

We secure remote access to resources using a modern SASE VPN. We also use malware-blocking DNS servers to protect employees and their endpoints while browsing the internet.

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

Endpoint Protection

All corporate devices are centrally managed and equipped with mobile device management software and anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and software updates.

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

Identity and Access Management.

Tabernacle Technology Solutions uses Okta to secure our identity and access management. We enforce the use of phishing-resistant authentication factors wherever possible. Employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.

​

​

​

​

​

​

​

​

​

​

​

​

​

 

Regulatory Compliance

We continuously evaluate updates to regulatory and emerging frameworks to evolve our program. Our commitment to security and privacy is unwavering, and we strive to exceed industry standards in every aspect of our operations.

​

​

​

​

​

​

Data.jpeg
Data 2.jpeg
Pen test demo.jpeg
Education pic.jpeg
Vulnerability.jpeg
pexels-pixabay-39584.jpg
pexels-pew-nguyen-241028.jpg
bottom of page