

When the FTC asks, when your insurer asks at renewal, when a client asks โ you'll have a file, not a conversation. We help CPA firms build the evidence trail that makes compliance defensible.
When the FTC asks, when your insurer asks at renewal, when a client asks โ you'll have a file, not a conversation. We help CPA firms build the evidence trail that makes compliance defensible.
Documented controls your cyber insurer can verify โ not just attestation
An organized evidence file, not a scramble to reconstruct what you've been doing
An honest assessment from someone who isn't grading their own work
Not a downloaded template โ a document your managing partners can stand behind
Know what your current agreement does โ and doesn't โ give you for compliance
Had a WISP document, assumed MSP handled everything, couldn't prove controls worked
Validated evidence package, passed insurance renewal without questions, confidence when clients ask
"We thought we were compliant until Steve showed us the gap between our document and actual evidence. Now we have proof that holds up."
โ [Client Name], [Firm Name]
Insurance carrier delayed renewal asking for evidence, scrambled to pull documentation together
Clear evidence package, renewal approved in days, no more last-minute panic
"Our carrier kept asking for proof we didn't have. After validation, we handed them a report and renewal was done. Worth every dollar."
โ [Client Name], [Firm Name]
Client asked about data protection, had nothing to show them but a WISP document
Professional evidence package, strengthened client trust, competitive advantage
"When our biggest client asked how we protect their data, I used to hope they'd accept 'we have a WISP.' Now I hand them a validated report."
โ [Client Name], [Firm Name]
Had a WISP document, assumed MSP handled everything, couldn't prove controls worked
Validated evidence package, passed insurance renewal without questions, confidence when clients ask
"We thought we were compliant until Steve showed us the gap between our document and actual evidence. Now we have proof that holds up."
โ [Client Name], [Firm Name]
Insurance carrier delayed renewal asking for evidence, scrambled to pull documentation together
Clear evidence package, renewal approved in days, no more last-minute panic
"Our carrier kept asking for proof we didn't have. After validation, we handed them a report and renewal was done. Worth every dollar."
โ [Client Name], [Firm Name]
Client asked about data protection, had nothing to show them but a WISP document
Professional evidence package, strengthened client trust, competitive advantage
"When our biggest client asked how we protect their data, I used to hope they'd accept 'we have a WISP.' Now I hand them a validated report."
โ [Client Name], [Firm Name]
Three situations where documentation
The FTC Safeguards Rule isn't abstract. It becomes concrete the moment one of these happens โ and whether you're ready determines the outcome.
Insurers are no longer accepting attestations at face value. They want documented evidence of MFA enforcement, access reviews, incident response testing, and your Written Information Security Program โ before they quote coverage.
Firms with organized evidence renew with stable premiums. Firms without it face exclusions, increases, or denial.
The Safeguards Rule requires firms handling 500+ consumers to notify the FTC within 30 days of a breach. The inquiry that follows focuses on one question: can you demonstrate that your security program was documented, implemented, and maintained?
Good intentions don't survive a compliance review. Evidence does. The gap between the two is what we help close.
Enterprise clients, family offices, and professional practices are increasingly asking their advisors and accountants about data security before engaging. The question isn't "do you take security seriously" โ it's "show me your program."
A documented security program is a competitive differentiator. Most of your competitors can't produce one on request.
Three stages. One complete
The FTC Safeguards Rule isn't abstract. It becomes concrete the moment one of these happens โ and whether you're ready determines the outcome.
We review your current state against all nine FTC Safeguards requirements โ not to find fault, but to find what you're already doing and where the evidence trail is thin.
20โ30 page assessment report with specific, actionable findings
Compliance scorecard across all nine Safeguards categories
Evidence inventory โ what exists, what's missing, what needs organizing
Risk-prioritized gap analysis so you know what to address first
Executive summary your managing partners can present to leadership
Not a vendor pitch for new technology. A sized, prioritized plan that uses your existing infrastructure wherever possible โ with the policies and templates to execute it.
Prioritized remediation plan with realistic effort estimates
WISP tailored to your firm โ not a generic template
Sample policies, procedures, and training documentation
Vendor contract language for security provisions
Board-level reporting template fulfilling QI requirements
We work alongside your existing MSP โ not instead of them. We provide the independent compliance oversight they aren't positioned to provide about themselves: monthly check-ins, documentation maintenance, training delivery, and preparation for every insurance renewal or inquiry that comes your way.
Monthly compliance check-ins and progress reviews
Annual risk assessment updates (required by the Rule)
Security awareness training delivery with completion records
Ongoing evidence repository maintenance
Incident response plan testing and documentation
Insurance renewal preparation and documentation package
Why your MSP can't validate
Your MSP does valuable work. But asking them to assess the security controls they manage is like asking a contractor to inspect their own construction. The conflict of interest is structural, and regulators and insurers are both starting to notice.
No technology to sell โ our only interest is accurate findings
Assesses the controls your MSP implemented, independently
Compliance-first โ we think like a regulator, not an IT provider
30 years enterprise security experience validating controls in complex environments
Documentation organized for an FTC inquiry or insurance review
Works alongside your MSP โ preserves the relationship you have
Inherent conflict in evaluating their own implementation work
Technology-focused โ may miss documentation and governance gaps
Incentive to minimize findings to protect the client relationship
Rarely familiar with FTC Safeguards Rule specifics vs. general IT security
Deliverable is typically a status report, not audit-ready documentation
May not flag gaps that require additional MSP work (conflict of interest)
The FTC's position on this is clear: Firms are responsible for their security programs regardless of who manages their technology. Independent oversight isn't an optional extra โ it's how you demonstrate that your program is real, not just documented on paper.
The tier your firm is on determines which FTC-relevant security controls are technically available. We're not a Microsoft reseller โ but we help you understand what you're already paying for and whether it's being used for compliance.
| FTC Safeguard Requirement | O365 E3 | M365 Premium |
|---|---|---|
| MFA Enforcement | โ Basic | โ Conditional Access |
| Device Compliance Policies | โ Not included | โ Intune included |
| Threat Detection Logs | โ Limited | โ Defender for Business |
| Access Review Tooling | โ Not included | โ Azure AD P1 |
| Encryption Management | โ Manual config | โ BitLocker managed |
| Audit Log Retention | โ 90 days | โ 180 days |
| List Price (current) | $23/user/mo |
$22/user/mo โ Recommended |
The 3 P's Framework โ Policy Promise, Practice Proof, Paper Trail โ organizes every engagement. The goal isn't a perfect score on a compliance checklist. It's a program your firm can operate, explain, and defend.
We review your Written Information Security Program, risk assessment documentation, and formal policies against the nine FTC Safeguards requirements. Most firms have something here โ the question is whether it reflects their actual environment and has been maintained in the past 12 months.
We collect operational evidence: access control logs, training completion records, monitoring configurations, vendor contract provisions, incident response testing documentation. This is where most firms have the most exposure โ the controls exist, but nobody has been building the evidence trail.
We organize everything into a structured evidence repository โ a file your firm can present to a regulator, an insurer, or a client. Annual compliance reporting, board-level documentation, and ongoing maintenance procedures. When the call comes, you open the file. You don't reconstruct it.
The first conversation is 30 minutes. We'll ask about your current environment and tell you honestly whether an assessment makes sense for your firm right now.
30 years enterprise security experience
Independent โ no technology to sell
Missouri ยท Kansas ยท Nebraska
No long-term contract required
