user_mobilelogo

Highly knowledgeable

Michael is highly knowledgeable in the cyberspace security field.

I was able to attend a workshop that Michael served as panel member, at FIU during the 2013 South Florida PMI's Day of Excellence. His insight sparked great interest and awareness on the various threats and measures that IT practitioners and organizations must consider to address and protect that data assets. What I admire the most about Michael is his ability to share his knowledge and provide sound best practices that will help in being successful IT professionals. For this and many other reasons, I greatly recommend Mr. Michael Scheidell.

Greg Chavarria, PMI, ITIL, CISSP.  Private Sector IT Director

Consummate InfoSec Professional

Michael Scheidell is a great example of a consummate information security professional. Michael contributed a great deal to the successful implementation of our Information Security Program at Banco Internacional De Costa Rica when I was the V.P. of IT at that institution. Michael understands the importance of identifying the risk inherent on a network infrastructure, but more importantly, he is able to design and implement solutions that would minimize those risks to an acceptable level.

Ray Guzman, Former VP of IT

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy