![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_HIPAA-150x150.png)
HIPPA Compliance
The Health Insurance Portability and Accountability Act
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_PCI-150x150.png)
PCI DSS Compliance
The Payment Card Industry Data Security Standard
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_NIST-150x150.png)
NIST Compliance
The National Institute of Standards and Technology
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_CMMC-150x150.png)
CMMC Compliance
The Cybersecurity Maturity Model Certification
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_CaaS-150x150.png)
CaaS
Compliance as-a-service
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_SOC-150x150.png)
SOC
Security Operations Center
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_Backup-150x150.png)
Backup & Data Recovery
Full system backup & data recovery
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_Virus-150x150.png)
AntiVirus
Real-time virus protection
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_Patch-150x150.png)
Patch Management
Preventing threats and keeping software up-to-date
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_Cyber-150x150.png)
Cybersecurity Services
Managed cybersecurity services
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_IT-150x150.png)
IT Services
Managed IT services
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_Endpoint-150x150.png)
Endpoint Detection & Response
Threat prevention, detection & response
![Resource Library](https://jkconsultingco.wpenginepowered.com/wp-content/uploads/2022/05/Icon_Default_Multi-150x150.png)
Multi-Factor Authentication
Secure access to internal and cloud-based applications