user_mobilelogo

Always Proactive

I used Mike's [previous] company [at Curagen] ... for management of our IPS/IDS security infrastructure. Mike and his team were always proactive, keeping us informed of external threats and provided us great value for money for the work that he and his team performed.

Martin Leach, Vice President R&D IT, Biogen IdecBiogen Idec

Knowledge and Creativity

My law firm early adopted the "SpammerTrap"--a product developed by Mike Scheidell ... Hands down, the SpammerTrap outperformed the [other product] at every turn. The capabilities of the SpammerTrap are a testament to the deep technical knowledge and creativity of Mike Scheidell.

Steven Greenberg, Partner at CRGO LawCRGO Law

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy