Information Assurance: With focus on developing standards, baselines, guidelines, and procedures for supporting the development, implementation, and assessment of information systems, our analysts have developed polished procedures to ensure your data is compliant in accordance with established policies. Questioning whether or not a website or email is a potential phishing attack or fraud? Our analysts inspect the dubious item and validate the entry for this form of attack and verify its integrity. Information Assurance is the grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or by-pass.