Bizcare Inc | Trust Center
BizCare's THRIVE-SECURE Center
BizCare is committed to ensuring peace of mind, trust, security, and support while we guide you on your cybersecurity compliance journey.
FAQs

Monitoring

Continuously monitored by Secureframe
View all

Subprocessors

AT&T

Voice, video, data, and Internet telecommunications and professional services

Cisco Duo

User identities, device trust, and secure connections to networks and applications

Cisco Meraki

Manage, configure, and deploy networks devices, protocols, programs, etc.

Cisco Umbrella

Secure web gateway, firewall, DNS-layer security, data loss prevention, and cloud access security broker (CASB)

Comcast

Internet, phone, and cable television

Freshworks

IT Service Management and Ticketing

GoDaddy

Website building, hosting, email, and marketing

Intermedia

Consolidates phone, video conferencing, chat, file sharing, customer care, and more applications on one platform

Keeper Security

Password Manager

View all

FAQs

CIS has 18 controls, but the most important controls for achieving the introductory IG1 standard are the first two. These are documenting physical assets and digital assets. This is because it's difficult to reach any other compliance objectives without knowing what you're protecting.
Think of this as an introductory credit card to building your credit score. IG1 is a benefit because not only does it prevent 75 plus percent of attacks, it also sets the foundation for other standards you plan to comply with (like SOC2, NIST, ISO27001, etc.). Overall, this "cyber credit score" gives the organization an optimal reputation for other entities you want to get into business with, including cyber insurance providers.
Usually it's best to start with introductory policies to understand how to sign off on these documents and properly store them. We recommend starting with an Acceptable Use Policy because you get all of the above while not changing the operations too much. Then we recommend moving to the high impact policies, like Business Continuity & Disaster Recovery (BCDR) and Vulnerability & Patch Management policies.
There are thousands of solutions, but they can be boiled down to one of three classifications - Technical Controls, Administrative Controls, and Physical Controls. When considering the proactive and reactive defenses, meaning before and after an attack starts, different classifications of controls will be recommended. For example, automated Technical Controls can handle a lot of the proactive side, such as Microsoft and Cisco's suite of products. However, on the reactive side, it's mostly going to be human based. This is why Administrative Controls really shines when the attacks inevitably happen, because they determine whether a playbook is effective or not.
This is the hardest thing to achieve under IG1 because it's difficult to automate this. This key is to build a system where you can seamlessly add the inventory, but also have a hierarchy that you can sort through to find even the most specific items (such as IP Addresses). Software tools can help, but these controls are mostly human based. Hire someone that is systems-oriented. Signs of these skills are finding optimal credit card strategies, staying fit and healthy, etc.
You must have an Access Control and Termination policy, which defines requirements for access and removal of access to the organization's data, systems, facilities, and networks.
IG1 Control 14 is an entire control that documents these requirements. The program must influence behavior among the workforce to be security conscious and properly skilled to reduce cybersecurity risks to the enterprise. Luckily, there are providers that can satisfy this requirement in a turn-key fashion, such as Proofpoint, Huntress, and Microsoft.
Update your cybersecurity playbook to continuously ensure that monitoring is actually being done on the technical side (sometimes this is turned off by default). Then, there are tools that can streamline the log management side for humans, such as Security and Information and Event Management (SIEM) platforms. These take in logs from all different types of sources and then displays them in one dashboard. Splunk is a great provider.
For IG1 compliance, Bizcare Inc follows a comprehensive patch management process. This includes protection from known vulnerabilities by installing applicable vendor-supplied security patches, and other patches not identified as critical are applied on a regular maintenance schedule defined by system maintenance and support procedures. Bizcare Inc applications are patched in accordance with the Change Management Policy. For high-risk or critical patches, the rollout may follow a compressed schedule. The patch management process is part of a broader vulnerability management process that includes third-party security tests and
We document our IG1 compliance through annual reviews of our vendors, which are retained for audit purposes. These reviews may include the gathering of applicable compliance audits such as SOC 1, SOC 2, PCI DSS, HITRUST, ISO 27001, among others. We also review our in-place security controls as part of this process.

Monitoring

Change Management

Configuration and Asset Management Policy
A Configuration and Asset Management Policy governs configurations for new sensitive systems
Segregation of Environments
Development, staging, and production environments are segregated.

Availability

Business Continuity and Disaster Recovery Policy
Business Continuity and Disaster Recovery Policy governs required processes for restoring the service or supporting infrastructure after suffering a disaster or disruption.

Organizational Management

Security Awareness Training
Internal personnel complete annual training programs for information security to help them understand their obligations and responsibilities related to security.
Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.

Confidentiality

Data Classification Policy
A Data Classification Policy details the security and handling protocols for sensitive data.
Data Retention and Disposal Policy
A Data Retention and Disposal Policy specifies how customer data is to be retained and disposed of based on compliance requirements and contractual obligations.

Vulnerability Management

Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Risk Assessment

Vendor Risk Management Policy
A Vendor Risk Management Policy defines a framework for the onboarding and management of the vendor relationship lifecycle.

Network Security

Endpoint Security
Company endpoints are managed and configured with a strong password policy, anti-virus, and hard drive encryption

Access Security

Removal of Access
Upon termination or when internal personnel no longer require access, system access is removed, as applicable.
Complex Passwords
Personnel are required to use strong, complex passwords and a second form of authentication to access sensitive systems, networks, and information
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information
User Access Reviews
System owners conduct scheduled user access reviews of production servers, databases, and applications to validate internal user access is commensurate with job responsibilities.
Asset Inventory
A list of system assets, components, and respective owners are maintained and reviewed at least annually