top of page

COMPUTER AND INFORMATION SECURITY

Your computers are targets of criminals, whether they are installed on-site or hosted in the cloud.

Computer systems are TARGETS of criminals and are attacked to slow or disrupt work.

 - DDoS attacks. "Denial-Of-Service attack" overall network slowdowns or outages 

 - Malware attacks result in your computers acting as proxy agents for spam or malware operations

 - Cryptopirate attacks result in system slowdowns as they become a distributed crypto-mining operation client

 - Ransomware attacks results in hostage taking of your data until a fee is paid. Usually results in TOTAL data loss.

COMPANY SECURITY POLICY,  PROCEDURES, BUSINESS CONTINUATION AND RELATED DOCUMENTATION

As your company grows it will need a written policy on information security. We can help you come up with governance policy and procedures from senior management to staff leaders.

Some industries require a written "business continuation" document, in case of a major disruptive event. We can help your company plan-for, write-for and recover-from such incidents.

Consider implementing standards, baselines and guidelines. They help lower your total exposure to cyber-criminals, increase security with overall systems control and support faster disaster recovery.

Personnel security applies to all of the above and should consist of awareness and training, background checks and immediate circuit-breakers in case of personnel dismissal or employee termination. 

 

Connected vendors, consultants or clients are oftentimes the weakest links in your security chain.

bottom of page