Skip to main content
MyITCyberGet in touch
// legal · security-and-compliance

Security & Compliance

Last updated: May 17, 2026

Security is not a feature of what we deliver — it is the foundation. This page summarises the controls, processes, and operational practices MyIT Cyber applies across our own systems and within the services we operate for clients.

01Identity & Access Control

Multi-Factor Authentication (MFA)

MFA is enforced on every employee account, every administrative console, and every privileged production system. Clients onboarded into MyIT Cyber-managed environments are required to operate with MFA on all admin tiers.

Access Control Policies

02Endpoint Protection

Every endpoint we manage runs an enterprise-grade EDR/XDR agent with continuous behavioural analytics, automated containment of confirmed threats, and centralised telemetry forwarded to our monitoring stack.

03Encryption

In Transit

All client-facing services are served exclusively over TLS 1.2+ with modern cipher suites. Management traffic between our platforms and managed environments is encrypted end-to-end.

At Rest

Customer data stored within MyIT Cyber-operated infrastructure is encrypted at rest using AES-256 or platform-equivalent. Encryption keys are managed through hardware-backed key vaults with access logging.

04Security Monitoring

Managed environments are monitored continuously. Telemetry from endpoints, network appliances, identity providers, cloud workloads, and SaaS platforms is correlated in our SIEM and reviewed by our analysts.

05Vulnerability Management

We operate a continuous vulnerability management programme covering infrastructure, applications, and third-party dependencies.

06Backup & Disaster Recovery

Backup strategies are designed per client environment and validated through periodic restore tests — backups that have never been tested are not backups.

07Incident Response

Our incident response process follows a defined lifecycle:

08People & Operations

09Third-Party Risk

Vendors and platforms that touch client data are evaluated against security and compliance criteria before integration, and reviewed on a recurring basis. We prefer providers with recognised attestations (SOC 2, ISO 27001, or equivalent) and clear data residency commitments.

10Reporting a Security Concern

If you believe you have discovered a vulnerability or security issue affecting MyIT Cyber or a client environment we operate, please contact us at security@myit.co.il. We treat all reports confidentially and will respond in line with our incident-response process.