LeastTrust IT

Cybersecurity, IP, and Insider Threat Advisory

LeastTrust IT (formerly Inquisitive IT) delivers organizations and individuals the same IT, cybersecurity, risk & privacy approach that large organizations deploy.  How do we make it affordable? Our core strategy is called Least Trust Lean Function. The strategy is to provide employees the right amount of data access while also the ideal amount of IT resources. Our strategy give adversaries less opportunities to attack, but also drives business outcomes and resiliency. Our defenses are focused on recent attacks summarized in the Verizon Annual Breach Report.  Our approach and supporting documentation is one that regulators, auditors, and outside stakeholders demand. 

We may also assist your end clients by providing tools, procedures, and education to protect their account access and assets in them. We call this secure laptop our VaultBook. To the user it’s simple to use. To cyber practitioners this laptop relies on physical encryption keys, privacy configurations, and selected CIS Chrome Recommendations

LeastTrust also has a Managed Privacy Service (MPS) that assists with legal and healthcare organizations. We can work with your team to tag, track, secure, and log all of your PHI, PCI or sensitive data. Our tools are state of the art and give our clients “Chain of Title” on regulated or sensitive data. We can train your team to utilize this evolving class of privacy tools.

Managed Google WorkSpace
Vaultboot

VaultBook

Secure Laptops for Individuals, HNW, Investors, and Dedicated Operations

 

VaultBook combines best in class login technology, simple services, and the full might of google’s security stack to protect retirees, High Net Worth (HNW) investors, and  companies looking to manage their most critical functions. Vaultbook deploys Least Trust, Lean Function to minimize attack surface area for attackers. We manage and train our clients how to stay safe online. Business also use dedicated Vaultbook for admin privileges and managing critical IT systems. 

managed data privacy

Managed Privacy

Our team consists of cybersecurity practitioners, business founders, financial analysts, and technology engineers. 

Our MPS (Managed Privacy Services) leads your team to protect sensitive data. We will train your people and stand up the tools necessary to tag, track, protect, and monitor  sensitive data. The tools can protect Healthcare data (PHI – HIPAA), Payment cards (PCI), sensitive legal documents, confidential files, and/or proprietary data.

5 most common attacks

Security Advisory

  1. Has your company experienced an incident of data loss, ransomware, or employee theft?
  2. Are you unsure that your security controls would pass a required compliance audit? 
  3. Are your customers, partners, or investors inquiring to see evidence of reasonable security commitments?
  4. What is your company’s history in acquiring cybersecurity insurance?
  5. Ever had an employee exit with customer lists or proprietary data? 

 

These are all common issues incoming clients are facing. Our approach is to assess your current security posture and propose an affordable and viable roadmap to address the gaps necessary to met the required target. 

Leasttrust IT

Cybersecurity

Secure IT (& the Evidence to Support it)

Risk Advisory

Risk & Governance (Including Policy Recommendations)

Privacy

HIPAA, GPDR, GLBA, SEC, SOC2, ISO

Intellectual Property

Innovate, Identify, Protect & Monitor

Client Testimonials

“LeastTrust's "security first” mindset designed our everyday IT systems and guided out team how to follow zero-trust best practices. The process and journey has felt like each Inquisitive member is part of our team. Inquisitive will always have a seat as a trusted advisor in our strategy sessions."
Sendfriend
“Tim and the LeastTrust IT Team delivered the tools and education that are affordable and defensible to due diligence from cyber insurers and new clients"
Intellectual Property
Olsen & Co