Site Map
Links to Altius IT web site pages
Company Information
About us - philosophy, certifications and credentials
Contact information - our services are provided throughout the U.S. and in selected
international countries
Cookie Policy - information our our web site cookies, purpose, and type
Do not sell - we do not sell consumer personal information
Home - IT audit, IT security audit, cyber security audit, and network security audit
services
In the News - national television, presentations, publications
Privacy Policy - how we use and keep your information secure
Audit and Assessment Services
Compliance audit - meet security and compliance requirements
External network security audit - cyber security audit & penetration test of
your
public IP/network addresses
Mobile application security - security of mobile applications and interfaces to
internal servers and databases
Network security audit - IT audit 50 point plan evaluates your security
safeguards and
controls
Privacy audit - transparency provides openness and clarity to the capture and use
of
sensitive information
Risk assessment - identifies your assets, threats, and vulnerabilities, Risk
Treatment
Plan to address risks
Services - Altius IT's IT audit, IT security audit, cyber security audit, and network
security audit services
Social engineering - evaluates the effectiveness of your security education
and
awareness programs
Web application (website) security audit - penetration test of your web
application
and web server for risks
Audit Resources
Auditor Opinion Letter - our Auditor Opinion Letter and Secure Seal let
your clients know you are secure
Policies - over 100 policies, plans, and forms to meet security and compliance
requirements
Secure Seal - our visible assurance of trust the organization has passed our
security audit
Why Altius IT - how we add value to your organization
Security Resources
Articles - complimentary articles, white papers, and security best practices
Blog - cyber security and network security blog
Security Newsletter - latest security trends, ideas, and techniques
Success Stories - case studies, industry experience, and recent projects