- Ongoing staff security training and testing
- Special controls on email use for staff
- Third party info sharing controls
- Device hardening
- Mandatory use of two factor authentication
- Powerful malware defenses
- Palo Alto PA-850 Firewalls
- Dedicated micro-security camera system
- Topaz door monitoring
- Fike fire alarm control
- Veeam data back up
- Mitsubishi uninterruptible power supply
Requires a person logging in to confirm their identity using a separate device, greatly increasing security & preventing costly breaches.
Sen. Burr warned that hackers remain active and could increase efforts. Burr has been vocal about political campaigns taking security seriously.
Two factor authentication is the first step in political software security. Other vendors have suffered large-scale security breaches for decades and still don’t offer the level of security you get with ISP. We take your campaign’s security seriously and protecting your data will always be our priority.