{"id":213,"date":"2020-11-11T19:40:47","date_gmt":"2020-11-11T19:40:47","guid":{"rendered":"https:\/\/shemallc.com\/?page_id=213"},"modified":"2025-11-14T03:38:40","modified_gmt":"2025-11-14T03:38:40","slug":"security-and-risk-managment","status":"publish","type":"page","link":"https:\/\/shemallc.com\/?page_id=213","title":{"rendered":"Security and Risk Management"},"content":{"rendered":"\n<p class=\"has-x-large-font-size\"><strong>Security and Risk Management<\/strong><\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>Strong security and clear communication go hand in hand.<\/strong>  We help you protect what matters, without slowing people down. <br>Our approach blends modern controls, simple processes, and practical training so your team can work with confidence.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\">Our principles<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\">Security is part of everyday work\u2014not a bolt-on.<\/li>\n\n\n\n<li style=\"font-size:16px\">Most risk starts with <strong>identity<\/strong> (people &amp; access), not just firewalls.<\/li>\n\n\n\n<li style=\"font-size:16px\">Threats come from <strong>outside and inside<\/strong>, and can be <strong>accidental or deliberate<\/strong>.<\/li>\n\n\n\n<li style=\"font-size:16px\">Tools don\u2019t \u201csolve\u201d security; <strong>habits and governance<\/strong> do.<\/li>\n\n\n\n<li style=\"font-size:16px\">The landscape changes\u2014so we <strong>measure, learn, and improve<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left\" style=\"font-size:18px\"><em>What we deliver<\/em><\/h3>\n\n\n\n<p style=\"font-size:18px\"><strong>Assess &amp; Plan<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\">Security health check and prioritized roadmap<\/li>\n\n\n\n<li style=\"font-size:16px\">Policy &amp; gap reviews mapped to <strong>PIPEDA\/FOIP<\/strong> and, when needed, <strong>HIPAA<\/strong><\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:18px\"><strong>Protect (Prevent)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>Zero Trust access:<\/strong> MFA, least-privilege, role-based access (Microsoft 365\/Entra ID)<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Device hardening &amp; patching; <\/strong>secure configurations for cloud and on-prem<\/li>\n\n\n\n<li style=\"font-size:16px\">Email\/web protection and safe file-sharing patterns<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:18px\"><strong>Detect (Know fast)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\">Endpoint protection (<strong>EDR\/XDR<\/strong>) and unified logging\/SIEM<\/li>\n\n\n\n<li style=\"font-size:16px\">Alert tuning so signals are actionable (not noisy)<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:18px\"><strong>Respond &amp; Recover<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\">Incident response runbooks and <strong>tabletop exercises<\/strong><\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Backup &amp; disaster recovery<\/strong> with immutability and tested RPO\/RTO<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:18px\"><strong>Educate<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\">Practical awareness training and phishing drills tailored to your team<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg\" alt=\"\" class=\"wp-image-41\" style=\"aspect-ratio:1.3636363636363635;width:209px;height:auto\" srcset=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg 640w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a-600x450.jpg 600w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\">Technologies we work with (selected)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\">Firewalls\/VPN, secure remote access, network segmentation<\/li>\n\n\n\n<li style=\"font-size:16px\">Microsoft 365 &amp; Entra ID (MFA, Conditional Access, DLP)<\/li>\n\n\n\n<li style=\"font-size:16px\">EDR\/XDR, email security, vulnerability scanning &amp; patch orchestration<\/li>\n\n\n\n<li style=\"font-size:16px\">Backup\/DR platforms (with immutability), logging\/SIEM<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p style=\"font-size:16px\"><em>Healthcare ready:<\/em> We design on HIPAA-eligible services and support BAAs where applicable, with encryption in transit\/at rest, audit trails, \u201cminimum necessary\u201d data use, and documented breach procedures, while also aligning to Canadian privacy rules.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:18px\">A friendlier way to start<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:16px\"><strong>Option A: Security Health Check (2\u20133 weeks)<\/strong> &#8211; quick wins, clear priorities<\/li>\n\n\n\n<li style=\"font-size:16px\"><strong>Option B: Incident-Readiness Tune-up<\/strong> &#8211; test runbooks, refine roles, close gaps<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image is-resized size-large is-resized-\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-1024x683.jpg\" alt=\"\" class=\"wp-image-16\" style=\"width:320px;height:191px\" srcset=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-1024x683.jpg 1024w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-scaled-600x400.jpg 600w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-300x200.jpg 300w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-768x512.jpg 768w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-1536x1024.jpg 1536w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-2048x1365.jpg 2048w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-1200x800.jpg 1200w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/concept-1-1980x1320.jpg 1980w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p style=\"font-size:17px\">Let\u2019s make security simpler and stronger<br>\u2022 <a href=\"mailto:support@shemallc.com\">support@shemallc.com<\/a> \u2022  <strong>(780) 800-8035<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/unevoc.unesco.org\/home\/\"><img loading=\"lazy\" decoding=\"async\" width=\"270\" height=\"118\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2021\/04\/logo_unevoc.gif\" alt=\"\" class=\"wp-image-797\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/un-spider.org\/\"><img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"94\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/un-spider.jpg\" alt=\"\" class=\"wp-image-103\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/irena.org\/\"><img loading=\"lazy\" decoding=\"async\" width=\"253\" height=\"85\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/irena.jpg\" alt=\"\" class=\"wp-image-100\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.un.org\/en\/\"><img loading=\"lazy\" decoding=\"async\" width=\"293\" height=\"102\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/un.jpg\" alt=\"\" class=\"wp-image-102\"\/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.deped.gov.ph\/\"><img loading=\"lazy\" decoding=\"async\" width=\"816\" height=\"312\" src=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/pbs.jpg\" alt=\"\" class=\"wp-image-101\" srcset=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/pbs.jpg 816w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/pbs-300x115.jpg 300w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/pbs-768x294.jpg 768w, https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/pbs-600x229.jpg 600w\" sizes=\"auto, (max-width: 816px) 100vw, 816px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security and Risk Management Strong security and clear communication go hand in hand. We help you protect what matters, without slowing people down. Our approach blends modern controls, simple processes, and practical training so your team can work with confidence. Our principles What we deliver Assess &amp; Plan Protect (Prevent) Detect (Know fast) Respond &amp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"googlesitekit_rrm_CAowyo3dCw:productID":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-213","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security and Risk Management - SHEMA<\/title>\n<meta name=\"description\" content=\"Without security, there is no true communication. Without communication, there is no true security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shemallc.com\/?page_id=213\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and Risk Management - SHEMA\" \/>\n<meta property=\"og:description\" content=\"Without security, there is no true communication. Without communication, there is no true security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shemallc.com\/?page_id=213\" \/>\n<meta property=\"og:site_name\" content=\"SHEMA\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/shemallc\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T03:38:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213\",\"url\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213\",\"name\":\"Security and Risk Management - SHEMA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shemallc.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shemallc.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/net-5a.jpg\",\"datePublished\":\"2020-11-11T19:40:47+00:00\",\"dateModified\":\"2025-11-14T03:38:40+00:00\",\"description\":\"Without security, there is no true communication. Without communication, there is no true security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shemallc.com\\\/?page_id=213\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213#primaryimage\",\"url\":\"https:\\\/\\\/shemallc.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/net-5a.jpg\",\"contentUrl\":\"https:\\\/\\\/shemallc.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/net-5a.jpg\",\"width\":640,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shemallc.com\\\/?page_id=213#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shemallc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shemallc.com\\\/#website\",\"url\":\"https:\\\/\\\/shemallc.com\\\/\",\"name\":\"SHEMA Logistics & Leveraged Communications Ltd.\",\"description\":\"Logistics &amp; Leveraged Communications Ltd.\",\"publisher\":{\"@id\":\"https:\\\/\\\/shemallc.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shemallc.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shemallc.com\\\/#organization\",\"name\":\"SHEMA Logistics & Leveraged Communications Ltd.\",\"url\":\"https:\\\/\\\/shemallc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shemallc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shemallc.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/LOGO-meraki.jpg\",\"contentUrl\":\"https:\\\/\\\/shemallc.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/LOGO-meraki.jpg\",\"width\":161,\"height\":100,\"caption\":\"SHEMA Logistics & Leveraged Communications Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shemallc.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/shemallc\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and Risk Management - SHEMA","description":"Without security, there is no true communication. Without communication, there is no true security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shemallc.com\/?page_id=213","og_locale":"en_US","og_type":"article","og_title":"Security and Risk Management - SHEMA","og_description":"Without security, there is no true communication. Without communication, there is no true security.","og_url":"https:\/\/shemallc.com\/?page_id=213","og_site_name":"SHEMA","article_publisher":"https:\/\/www.facebook.com\/shemallc","article_modified_time":"2025-11-14T03:38:40+00:00","og_image":[{"url":"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg","type":"","width":"","height":""}],"twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/shemallc.com\/?page_id=213","url":"https:\/\/shemallc.com\/?page_id=213","name":"Security and Risk Management - SHEMA","isPartOf":{"@id":"https:\/\/shemallc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shemallc.com\/?page_id=213#primaryimage"},"image":{"@id":"https:\/\/shemallc.com\/?page_id=213#primaryimage"},"thumbnailUrl":"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg","datePublished":"2020-11-11T19:40:47+00:00","dateModified":"2025-11-14T03:38:40+00:00","description":"Without security, there is no true communication. Without communication, there is no true security.","breadcrumb":{"@id":"https:\/\/shemallc.com\/?page_id=213#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shemallc.com\/?page_id=213"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shemallc.com\/?page_id=213#primaryimage","url":"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg","contentUrl":"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/net-5a.jpg","width":640,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/shemallc.com\/?page_id=213#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shemallc.com\/"},{"@type":"ListItem","position":2,"name":"Security and Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/shemallc.com\/#website","url":"https:\/\/shemallc.com\/","name":"SHEMA Logistics & Leveraged Communications Ltd.","description":"Logistics &amp; Leveraged Communications Ltd.","publisher":{"@id":"https:\/\/shemallc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shemallc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shemallc.com\/#organization","name":"SHEMA Logistics & Leveraged Communications Ltd.","url":"https:\/\/shemallc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shemallc.com\/#\/schema\/logo\/image\/","url":"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/LOGO-meraki.jpg","contentUrl":"https:\/\/shemallc.com\/wp-content\/uploads\/2020\/11\/LOGO-meraki.jpg","width":161,"height":100,"caption":"SHEMA Logistics & Leveraged Communications Ltd."},"image":{"@id":"https:\/\/shemallc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/shemallc"]}]}},"_links":{"self":[{"href":"https:\/\/shemallc.com\/index.php?rest_route=\/wp\/v2\/pages\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shemallc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shemallc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shemallc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shemallc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=213"}],"version-history":[{"count":91,"href":"https:\/\/shemallc.com\/index.php?rest_route=\/wp\/v2\/pages\/213\/revisions"}],"predecessor-version":[{"id":1808,"href":"https:\/\/shemallc.com\/index.php?rest_route=\/wp\/v2\/pages\/213\/revisions\/1808"}],"wp:attachment":[{"href":"https:\/\/shemallc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}