Security is a complex space that requires sophisticated tool sets to thwart off bad actors and their attempts to access and control unauthorized data assets.  Contact has invested heavily in Cisco’s threat intrusion technology which integrates endpoints back to a series of hardened firewalls.  These firewalls protect all access points into the network, terminates malicious activities/services, and provides an on-demand representation of the environment.  We have also taken steps to implement multi-factor authentication to lock things down further.  These services coupled with enterprise grade vulnerability scanning allows us to identify, access, and mitigate weakness in near real time.