Marom Consulting and Security Technology

Marom Consulting, through Marom Tech and its technology platform vendor, utilizes the latest, most sophisticated cloud computing infrastructure in the industry to ensure that our customers� data is protected with comprehensive physical security, data encryption, user authentication, and application security as well as the latest standard-setting security practices and certifications, including:

  • World-class security specifications
  • SAS 70 Type II, SOX, ISO27001, and third-party vulnerability and SysTrust certifications
  • Secure point-to-point data replication for data backup: Backup tapes for customer data never leave our facilities�no tapes ever in transport
Complete Disaster Recovery

Marom Consulting uses one of the best cloud-computing platforms to deliver fully mirrored data centers that provide seamless disaster recovery. The data centers follow stringent backup-and-recovery procedures to ensure that customer data is safe. This approach includes:

  • A full-scale 1:1 disaster recovery facility that guarantees consistent service performance in the event of a regional disaster
  • Multilevel data integrity and backup procedures that ensure rapid recovery with minimal data loss
Protect your computer�s security

  • Keep your computer and browser software current with security updates;
  • Install and update anti-virus and anti-spyware software and use personal firewalls to protect your computer;
  • Be alert to the threats posed by malware--(malicious software) which can damage or disrupt your system, or secretly record information such as keystrokes;
  • Do not enable automatic login to your Marom Consulting account or pre-fill the Login ID or password fields;
  • Change your password periodically and avoid using passwords for Marom Consulting that you commonly use for other purposes; and
  • For more information on how to protect your personal computer, including links to vendors providing anti-virus and anti-spyware software, you can visit the Federal Trade Commission�s computer security site. Microsoft Corporation provides additional information specific to the Windows operating system at Users of Apple computers can find security information at
Using your computer in a safe manner

  • Do not share your Login ID and password with anyone;
  • Check to make sure you are interacting with a secure Web site, as above;
  • Always log off after completing your activities on Marom Consulting.
  • Be careful about using third-party computers or computers that you are not familiar with such as those in Internet caf�s and be careful to ensure you have fully logged out.
Preventing fraud

Do not provide personal or financial information in response to an email request or by clicking on a link, unless you are able to verify the authenticity of the site to which you are taken through the SSL padlock or other means; Do not enter personal information into a form within an email message or a pop-up; Do not open an email if you do not recognize the sender and be particularly cautious of any attachments to emails from unrecognized sources. Identity theft

Take steps to safeguard your information to help protect yourself from identity theft. Marom Consulting takes steps to protect you from identity theft by:

  • Utilizing user identification and authentication procedures before permitting access to Marom Consulting;
  • Creating a secure transmission connection to Marom Consulting. You will see the security padlock in your browser�s frame indicating that it�s a secure site;
  • Ensuring our employees are trained to safeguard your information.
You can also help protect your identity and account information. Here are a few steps to remember:
  • Marom Consulting will never request your Login ID or password, or any other information in either a non-secure or unsolicited email communication;
  • Check your credit report regularly for unauthorized activity and protect your personal identification numbers (PINs) or personal data;
You can protect yourself against phishing

Phishing is the illegal attempt to mislead consumers into providing personal or financial information, including account numbers, passwords and Social Security numbers, via email or through fraudulent Web sites. The most frequent phishing attacks occur through emails disguised to appear as though they came from a reputable financial institution or company. Most phishing attempts urge you to update or validate your account information, typically through a link in an email directing you to a fake Web site that appears to be legitimate. A phishing attack can be detected

While there are many phishing attacks active on the Internet, there are some typical characteristics:

  • An email contains an �urgent� tone requesting your immediate action on an account-related matter.
  • An email is sent from a user falsely claiming to be a legitimate company with an attachment. An unsolicited email attachment more than likely contains a virus. Do not open it.
  • A pop-up window appears from a user falsely claiming to be a legitimate company�s Web site asking for personal information.
  • Additional information can be found at or


Marom Consulting
332 Bleecker Street; Suite 227
New York, NY 10014