
COMPUTER AND INFORMATION SECURITY
Your computers are targets of criminals, whether they are installed on-site or hosted in the cloud.
Computer systems are TARGETS of criminals and are attacked to slow or disrupt work.
​
- DDoS attacks. "Denial-Of-Service attack" overall network slowdowns or outages
- Malware attacks result in your computers acting as proxy agents for spam or malware operations
- Cryptopirate attacks result in system slowdowns as they become a distributed crypto-mining operation client
- Ransomware attacks results in hostage taking of your data until a fee is paid. Usually results in TOTAL data loss.
COMPANY SECURITY POLICY, PROCEDURES, BUSINESS CONTINUATION AND RELATED DOCUMENTATION
As your company grows it will need a written policy on information security. We can help you come up with governance policy and procedures from senior management to staff leaders.
​
Some industries require a written "business continuation" document, in case of a major disruptive event. We can help your company plan-for, write-for and recover-from such incidents.
​
Consider implementing standards, baselines and guidelines. They help lower your total exposure to cyber-criminals, increase security with overall systems control and support faster disaster recovery.
​
Personnel security applies to all of the above and should consist of awareness and training, background checks and immediate circuit-breakers in case of personnel dismissal or employee termination.
Connected vendors, consultants or clients are oftentimes the weakest links in your security chain.