Define an operating model and clear roles and responsibilities for risk management, addressing Proxymity’s administrative, physical, and technical controls to protect the security, confidentiality, and integrity of customer data
Engage an independent external auditor to conduct annual reviews of Proxymity’s security practices against recognised audit standards, such as SOC 2 (Type II)
Establish compliance policies and procedures designed to ensure applicable statutory, regulatory, and contractual requirements are adhered to across Proxymity
Create information security policies, approved by management, published and accessible to all Proxymity employees
Review and update policies at planned intervals to maintain their ongoing relevance, adequacy, and effectiveness
Require all Proxymity employees undergo information security and privacy awareness training at time of hire and on an annual basis thereafter
Perform employee background screening of all new Proxymity employees prior to onboarding, in accordance with industry standards and best practices
Establish senior governance forums for the regular review of Proxymity’s enterprise risk profile, including reporting on key security control activities, established Key Risk Indicators (KRI) and incorporating appropriate external threat intelligence
Stay in touch
Stay updated with the latest trends. Sign up for our newsletter.