The Bottom Line

| News Coverage | Share:  

“We are very concerned about cyber security. The potential of identity theft is great and monitary loss can be quite large. We use best practices guidelines, which dictates: who has access; password protocol; encryption of data and emails; backup security; computers timing out; strong network security; top-of-the-line firewall and malware programs. There is also a procedure if anyone suspects a breach in cyber security.” – ProctorU Vice President of Operations Matt Jaeh

Read the full article, originally posted by the Birmingham Business Journal on September 28, 2012.