North Star IT
SVC · 10 · Managed

Security that
holds up on paper.

Because insurance asked, and the answer can't be 'we trust everyone'.

Written policies that match how you actually work. MFA on every account. Password rules people can follow. Incident response that doesn't end with a panicked group text. Built so when the insurance audit lands, you forward a folder instead of starting from zero.

// WHAT'S INCLUDED

The policy stack.

Real policies, written for trades and small business. Plain language. Enforceable. Tied to the technical controls that back them up.

// DELIV · 01

Written policies

Acceptable use, password, BYOD, remote work, incident response. Plain language so the team will actually read them.

  • AUP
  • PASSWORD
  • INCIDENT
// DELIV · 02

MFA everywhere

Multifactor on email, banking, accounting, remote access, admin accounts. Set up once, runs forever, blocks ninety percent of attacks.

  • EMAIL
  • BANK
  • ADMIN
// DELIV · 03

Password policy

A password manager for the team. Rules that actually make sense. Shared logins go in a vault, not a sticky note.

  • VAULT
  • SHARED LOGINS
  • ROTATION
// DELIV · 04

Backups & recovery

Tested, documented, off site. We run a real restore drill quarterly so we know it works before you need it to.

  • 3-2-1
  • OFF SITE
  • DRILL TESTED
// DELIV · 05

Audit support

When insurance, your bigger client, or a regulator asks for your security posture, you forward a folder. We keep it current.

  • INSURANCE READY
  • VENDOR FORMS
  • DOCUMENTED
// DELIV · 06

Training

Twenty minutes per new hire. Phishing examples, password rules, what to do if something feels off. The single biggest reduction in risk.

  • NEW HIRE
  • PHISH SIMS
  • REFRESHER
// HOW IT WORKS

From nothing written to audit ready.

// STEP · 01

Risk review

We look at what you have, what you handle, who has access. Real picture of the risk before any policy gets written.

// STEP · 02

Policy draft

Documents drafted in plain language. You review and edit. We don't ship anything you can't enforce.

// STEP · 03

Technical controls

MFA, password manager, backups, monitoring rolled out to match the policy. The paper and the practice line up.

// STEP · 04

Training & sign off

Team gets the short version of the training. Sign off on the policies. You have proof for the next audit.

Insurance asked the security question?

Forward us what they sent. We'll tell you what's missing and quote what it takes to close the gap.

Talk to us