user_mobilelogo

Innovative Solutions

While working as IT Director of a Biotechnology company, I hired Michael as a consultant to work out some firewall & security problems for us. Not only did he solve our existing problems, but he provided innovative solutions to provide network security and protect our intellectual property. Michael always operated with integrity and was driven to outperform our expectations. Michael is one of the top IT professionals I've met in my 30+ year career.

John Lappie, Director of Property Operations & Technology at Stonewall Resort, Formed Director of IT, Curagen Corporation

Detail Oriented Security Expert

Michael is a detail oriented security expert who has conceptualized future looking security changes and has addressed them through software and product develop. I have used Michael in several projects across multiple organizations and entrusted all my real time email and penetration testing to he and his products.

James Sampel, Managing Director Global Operations and Chief Information Officer at Greenwich AssociatesGreenwich Associates

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy