|
|
Security Assessment
How secure is your data from Hackers, from unauthorized internal
access, from data loss, from internet abuse, and other security
risks? We will take a look at a number of areas including:
- Virus Protection - Is your current solution adequate to meet
daily threats
- File Systems Security - Passwords, lockouts, group memberships
- Internet Security - Who has access, open ports, and firewall
configurations
- Physical Security - Who has access to servers, hubs, switches,
routers
- Data Loss - Backup procedures, off-site storage and power
protection
- Remote Access - Who has access, VPNs and firewalls
- Intrusion Detection - One time, or ongoing monitoring
- Intrusion Prevention - Preventing internal and external access
- Vulnerability Assessment - Remote and internal intrusion testing
Data Systems Recovery Planning
We can now help you develop a plan and setup systems to take
care of one of the most important aspects of recovering from a
disaster, data recovery. Don’t wait until it’s too late to
determine what your network’s critical components are and how to
recover from loss of your business data. To assist you in
preparing for such a contingency, Computer Systems Integration has a
number of data recovery service options available.
|
|