The triangle is intentionally shaded.
Why? Because IT Security always involves risk
and trade-offs. It is possible to have complete
data security, however that will almost
always require so many controls, restrictions
and inconveniences to the business that this is
simply not possible. It is our job to help you
balance risk against business needs.
The triangle in our logo is denotes the solid bedrock of "Information Assurance" upon which modern Information
Technology rests. There are three main tenants of "Information Security". They are Confidentiality, Integrity
and Availability.
Confidentiality
An organization must protect against unauthorized disclosure of sensitive data. To do this it must identify what
data is sensitive, and who is or is not allowed access to the data at every stage in the IT process.
Integrity
Organizations must take the proper precautions to insure that data integrity is maintained throughout the
business process. Data that is contaminated is of no use to anyone.
Availability
An organization must take steps to insure that data is readily, predictably and quickly available to employees and
others authorized to utilize the data.
-- Backups
-- Disaster Recovery Plans
-- Proper System and Network Capacity and Design