November 26, 2013
Businesses rely on third party organizations like Pathway Communications to provide them with essential services. As a service provider, we are responsible for ensuring our clients are able to enjoy safe, secure, and highly available services. With all of the risks facing businesses these days it has been increasingly important that service organizations have proper procedures and controls in place to protect the needs of their customers. To show our clients that we are committed to security and availability, we went through a rigorous SOC 2 audit and we passed all of the requirements.
What this meansA SOC 2 Type 2 audit demonstrates the establishment of effectively designed control objectives and control activities, and it shows that we are compliant and competent at implementing organizational controls. Many technology and telecommunication companies are beginning to realize the value of having a SOC 2 audit. Still, many Internet service providers and data centres do not have SOC 2 certification. At Pathway, we are proud to say that we are one of the few providers in Canada with both SOC 2 and ISO certification. You can request a copy of our SOC 2 report to use it as part of your compliance strategy.
Security and availabilityOur SOC 2 audit was performed by an external auditor who objectively reported on the quality of our organization’s security and availability protocols. During the auditing process, it was determined that Pathway Communications has superior security controls in place. We have taken all of the necessary precautions to ensure that security measures exist to protect against all types of unauthorized access, both physical and logical. We are responsible for confidential, sensitive, and private information belonging to both the company and our clients. As one of our clients you can rest assured that our network, and hence your data, is safe and secure. Below are some of the security controls in place to help us protect your interests and help serve your needs:
- 24/7 on-site security with video surveillance
- Only authorized key card entry to the facility, data centre, and our network operations centre
- Data Centre
- Security Policy
- Pathway Communications password policy
- Vulnerability scanning and firewalls
- Change Management protocols