top of page

COMPUTER AND INFORMATION SECURITY

Your computers are targets of criminals, whether they are installed on-site or hosted in the cloud.

Computer systems are TARGETS of criminals and are attacked to slow or disrupt work.

​

 - DDoS attacks. "Denial-Of-Service attack" overall network slowdowns or outages 

 - Malware attacks result in your computers acting as proxy agents for spam or malware operations

 - Cryptopirate attacks result in system slowdowns as they become a distributed crypto-mining operation client

 - Ransomware attacks results in hostage taking of your data until a fee is paid. Usually results in TOTAL data loss.

COMPANY SECURITY POLICY,  PROCEDURES, BUSINESS CONTINUATION AND RELATED DOCUMENTATION

As your company grows it will need a written policy on information security. We can help you come up with governance policy and procedures from senior management to staff leaders.

​

Some industries require a written "business continuation" document, in case of a major disruptive event. We can help your company plan-for, write-for and recover-from such incidents.

​

Consider implementing standards, baselines and guidelines. They help lower your total exposure to cyber-criminals, increase security with overall systems control and support faster disaster recovery.

​

Personnel security applies to all of the above and should consist of awareness and training, background checks and immediate circuit-breakers in case of personnel dismissal or employee termination. 

 

Connected vendors, consultants or clients are oftentimes the weakest links in your security chain.

bottom of page