Security foremost is one of our top priorities, which is why we have created an IT security management program aimed at reducing the risk of loss and improper use of critical MAZAJ information. It is a set of rules and practices covering control, employee education, incident reporting and periodic reviews.
They cover the area of:
Data and asset protection
Establish a proper classification and controls for information, data and asset categories. Adopt the access controls to enable access based on the need-to-know approach.
Physical and Environmental security
Put infrastructure resources in access-controlled areas, except those intended for public use. Adopt risk-based controls that may contain blocking or guarding some areas.
Registers and inventory of assets. Establish an acceptable use policy for each asset or group of assets. Check it back regularly to stay up to date.
Security standards for employees
Follow security and use standards for employees and their workstations, mobile devices, connection to the internal network, and confidentiality protection.
Set up a policy for applications and systems to manage risks related to user account management, access enforcement and monitoring, division of duties, and remote access.
Respond to incidents like a potential security breach of data or information technology assets owned or managed by MAZAJ or our clients.
Maintain operating procedures available to the specific users, such as authentication and authorization, backup, handling security incidents, and configuration of apps.
MAZAJ’s security standards and policy are regularly verified through a bunch of assessment frameworks, activities and internal audits, depending on the needs.
Design and operate networks to restrict access to the MAZAJ network and be resilient in the face of external threats like intrusion or disruptions.
Check how our clients use AI-supported solutions to achieve better financial results.