Have you received an IT risk assessment questionnaire? We can help with that. We audit, document, and secure networks, servers, client machines, and train end users.
Information Security Compliance with full documentation is becoming a common need, usually in the Finance, Insurance, and Medical fields. We can ensure that your systems comply with documented policies covering all aspects of systems including your users.
We will create a set of policies for your unique environment and regulatory requirements to ensure that your systems and users utilize the best security practices and minimize down time in the event of a catastrophic event.
What we can do for you:
- Help you answer risk assessment questionnaires and make sure you can give the “right” answers.
- Scan the network for vulnerabilities and address them.
- Create and document firewall policies and associated configurations.
- Create and document network policies including topology.
- Create and document policies for device authentication, authorization, and usage.
- Create and document remote access policies.
- Create and document business continuity policies.
- Set up Two Factor Authentication to combat “Phishing” schemes and possible widespread use of a password.
- Ensure anti-virus is installed on all applicable equipment and is kept current.