We are one of the few SOC 2, Type II Managed Service Providers in Canada. We maintain internal processes and procedures that keep our clients’ data secure and confidential.
When you choose Nucleus Networks, you’re not just hiring an IT provider, you’re partnering with a team that prioritizes your security and privacy.
SOC 2 is more than just a standard – it's a promise. A promise to provide transparency and reliability to our clients. With SOC 2, our clients can be confident that we are fully aligned with best practices in managing and safeguarding their critical information.
Jennifer Roy, Nucleus Networks CEO
SOC 2 Type II is a rigorous audit process designed by the American Institute of Certified Public Accountants (AICPA). It ensures Managed Service Providers (MSPs) like Nucleus follow strict rules to protect client data.
This is the only mandatory criteria to be included in a SOC 2 report, while all others are optional.
Nucleus received third-party guidance. Our team participated and contributed to the process. We documented all internal processes and procedures, as well as tools and systems.
The next step in the process was an audit of all processes and procedures, as well as tools and systems by a verified third-party. It was then confirmed that all requirements were in place.
A verification report was created documenting that Nucleus is SOC 2 Compliant. Clients can access this report through the Trust Portal.
As a MSP we handle critical aspects of Canadian businesses’ IT environments, from infrastructure to security monitoring. Being certified SOC 2, Type II ensures that we are adhering to the highest security and privacy best practices.
Our security controls have been independently assessed and verified by a third-party auditor.
We follow industry-leading best practices for data protection.
We have processes in place to detect and respond to security incidents.
Sensitive data is handled with transparency and accountability.
Ongoing improvements are made to adapt to ever-evolving cyber threats.
A SOC 2 report is an independent attestation that an organization has controls in place to maintain strong cybersecurity defenses, effective operational processes and a commitment to protecting client data. It is a measure of process maturity and the health of the business.
Obtaining SOC 2, Type II compliance requires meticulous monitoring and evidence that controls are in place for accountability, accuracy and security.
The independent review of evidence to support the controls is a continuous evaluation to confirm that processes are being followed, and policies are being enforced. The annual audit of evidence, performed by a certified third-party auditor, selects samples to verify compliance.
A SOC 2 report is a proprietary document and can be obtained through a non-disclosure agreement. Contact Nucleus Networks to learn more.
YES! Our team of IT Consultants can help your organization prepare for SOC 2 Compliance through a Readiness Assessment.
Contact us to Book a Consultation