isolved logo

Trust Center

Security

From infrastructure to interface, learn how isolved defends your organization by embedding protection into every layer of isolved People Cloud™.

Prioritizing Your Security

At isolved, protecting your information and data is essential to earning and keeping your trust. That’s why we continuously assess our security capabilities and make strategic investments in people, processes and technologies. We conduct independent assessments, have board-level visibility into strategic cybersecurity and operational risk objectives, leverage industry-leading providers and have dedicated resources to ensure viable risk and security management. Every safeguard is designed to reduce risk and deliver peace of mind so you can focus on growing your business with confidence.

This security section of the isolved Trust Center is designed to cover aspects of what the isolved team manages from application hosting, telecommunications, desktops, networking, infrastructure, cybersecurity, vendor management, software development lifecycle and fraud prevention. Risk analysis includes various testing of cyber, system and process controls conducted on a regular basis either internally or by a certified third-party provider across control types to ensure necessary and ongoing safeguards.

Ongoing Security Safeguards

Administrative Safeguards

Training, documentation, practices, policies and procedures that define business and personal-use practices in accordance with security and compliance goals. These can apply to employee hiring, termination, equipment, internet usage, physical access to company facilities, separation of duties, data classification, auditing, security and/or other risk training.

Technical Safeguards

Hardware, software and other technology mechanisms are used to protect assets. Common examples include authentication solutions, firewalls, antivirus software, intrusion detection systems (IDSs), intrusion protection systems (IPSs), constrained interfaces, and access control lists (ACLs) that protect access to/from data, networks and systems.

Physical Safeguards

Mechanisms are used to prevent or detect unauthorized access to physical areas, systems or assets. This may include, but is not limited to, security badges, locking doors, access cards, biometrics access controls, video cameras, surveillance cameras, motion sensors, fire suppression, and other environmental controls like HVAC and humidity controls.

Security Resources

Payroll

Protecting Against Pharming Attacks

Pharming attacks pose a serious threat, which is why it’s essential to reinforce best practices across your team.

Read More
Whitepaper

How isolved Safeguards Data

Learn how isolved keeps employer and employee data safe through ongoing investments in security.

Read More
Whitepaper

9 Ways to Protect Data

Stay vigilant by reviewing these best practices to keep consumer and employee data secure.

Read More

Security FAQs

Business email compromise is a type of cyberattack in which a criminal impersonates a trusted business contact, such as a vendor, CEO or payroll manager, to trick employees into transferring funds or revealing sensitive data. These attacks are often highly targeted and convincing, using spoofed email addresses and urgent language to bypass normal verification procedures.

To protect against BEC:

  • Always validate email requests for payments or sensitive data, especially if they seem urgent or unusual.

  • Contact the sender through a known, trusted channel before taking action.

  • Enable multi-factor authentication (MFA) on all email accounts.


The content of this Site is provided for informational purposes only. isolved does not provide legal, tax, accounting or investment advice, and nothing on this Site is intended to be or should be relied upon as such. isolved makes no representations that the information on this Site is current, accurate, complete, valid or suitable for any purpose, and will not be liable for any errors or omissions, delays in the publication of information, or for any losses, injuries or damages arising from the use of the content of this Site for any purpose whatsoever. All information provided on this Site is on an as-is basis. Information and resources linked to third-party sites are beyond the control of isolved and isolved shall have no responsibility whatsoever for the acts or omissions of any such third parties. No endorsement of any third-party product or service is expressed or implied.

Report a Concern
Should you have any concerns, please contact isolved’s security and compliance leadership team by clicking here: Report a Security Concern

isolved logo