LeastTrust IT (formerly Inquisitive IT) delivers organizations and individuals the same IT, cybersecurity, risk & privacy approach that large organizations deploy. How do we make it affordable? Our core strategy is called Least Trust Lean Function. The strategy is to provide employees the right amount of data access while also the ideal amount of IT resources. Our strategy give adversaries less opportunities to attack, but also drives business outcomes and resiliency. Our defenses are focused on recent attacks summarized in the Verizon Annual Breach Report. Our approach and supporting documentation is one that regulators, auditors, and outside stakeholders demand.
We may also assist your end clients by providing tools, procedures, and education to protect their account access and assets in them. We call this secure laptop our VaultBook. To the user it’s simple to use. To cyber practitioners this laptop relies on physical encryption keys, privacy configurations, and selected CIS Chrome Recommendations.
LeastTrust also has a Managed Privacy Service (MPS) that assists with legal and healthcare organizations. We can work with your team to tag, track, secure, and log all of your PHI, PCI or sensitive data. Our tools are state of the art and give our clients “Chain of Title” on regulated or sensitive data. We can train your team to utilize this evolving class of privacy tools.
VaultBook combines best in class login technology, simple services, and the full might of google’s security stack to protect retirees, High Net Worth (HNW) investors, and companies looking to manage their most critical functions. Vaultbook deploys Least Trust, Lean Function to minimize attack surface area for attackers. We manage and train our clients how to stay safe online. Business also use dedicated Vaultbook for admin privileges and managing critical IT systems.
Our team consists of cybersecurity practitioners, business founders, financial analysts, and technology engineers.
Our MPS (Managed Privacy Services) leads your team to protect sensitive data. We will train your people and stand up the tools necessary to tag, track, protect, and monitor sensitive data. The tools can protect Healthcare data (PHI – HIPAA), Payment cards (PCI), sensitive legal documents, confidential files, and/or proprietary data.
These are all common issues incoming clients are facing. Our approach is to assess your current security posture and propose an affordable and viable roadmap to address the gaps necessary to met the required target.
One time, recurring, and flexible partnerships
All of the tools, training, and procedures to best protect end clients and individuals. "Investing Only" Laptops.
Our mission is to build a sustainable security culture and roadmap. Our VCISO shows the way
Tag, Classify, Protect, Track, and Manage all of your sensitive and proprietary data. We can stand up your privacy program today
It surprising how many proprietary assets are trade secrets. We can help protect them. Do not file a patent without talking to us. (no cost)
Secure IT (& the Evidence to Support it)
Risk & Governance (Including Policy Recommendations)
HIPAA, GPDR, GLBA, SEC, SOC2, ISO
Innovate, Identify, Protect & Monitor
Our Team is located across the United States and can respond to your needs virtually in real time or be on location in hours.