Terradon Communication Group's information and computer security offerings are designed with three high level priorities in mind. TCG is dedicated to ensuring the confidentiality, integrity, and availability of clients' informational assets at all times.
A primary function of TCG's information and computer security services are the protection of private business information. Identification, access-control management, and control of sensitive information are paramount and it can be a daunting task for organizations. TCG brings years of expertise in protection from unauthorized or accidental disclosure of sensitive information.
A critical and often overlooked aspect of information security is the integrity of the information assets of an organization. Many organizations go to great lengths to insure information's confidentiality, yet fail to ensure that the information has not been tampered with, corrupted, or otherwise modified. Data corruption or tampering can be very difficult to detect, and even a small change in information content can have far reaching consequences. Data modifications can be intentional or accidental, but either scenario can have disastrous consequences and go undetected for long periods of time.
For information assets to be of use, they must be available. Redundancy, backup systems, contingency, business continuity, and disaster recovery planning and implementation all hinge around the concept of making information assets available to the people that need them, WHEN they need them.
TCG's HIPAA Security solutions can bring an organization into HIPAA Security compliance with the final rule. TCG can provide each of these services from an analytical (gap assessment), developmental (migration towards compliance) perspective, or both. The TCG service offerings comprise a turnkey solution for any organization's compliance with the final rule.
TCG is able to bring innovative solutions to its HIPAA security clients. For instance, TCG developed a HIPAA-compliant Electronic Medical Record software package, based on the workflow and protocols of the surgery center that it was created for. One feature of the aforementioned EMR package integrated legacy accounting/billing software and web-based applications, accessible anywhere via a secure SSL 128-bit connection. Another example of TCG ingenuity is a customized network threat aggregation system providing administrators and security personnel access to detailed or summary threat information across the enterprise.