Security Assessment

How secure is your data from Hackers, from unauthorized internal access, from data loss, from internet abuse, and other security risks? We will take a look at a number of areas including:

  • Virus Protection - Is your current solution adequate to meet daily threats
  • File Systems Security - Passwords, lockouts, group memberships
  • Internet Security - Who has access, open ports, and firewall configurations
  • Physical Security - Who has access to servers, hubs, switches, routers
  • Data Loss - Backup procedures, off-site storage and power protection
  • Remote Access - Who has access, VPNs and firewalls
  • Intrusion Detection - One time, or ongoing monitoring
  • Intrusion Prevention - Preventing internal and external access
  • Vulnerability Assessment - Remote and internal intrusion testing

Data Systems Recovery Planning

We can now help you develop a plan and setup systems to take care of one of the most important aspects of recovering from a disaster, data recovery. Don’t wait until it’s too late to determine what your network’s critical components are and how to recover from loss of your business data. To assist you in preparing for such a contingency, Computer Systems Integration has a number of data recovery service options available.