user_mobilelogo

Knowledge and Ability

I have known and worked with Michael for over 25 years. He is an accomplished businessman, brilliant inventor, and his knowledge and abilities in computer technology and network and internet security are second to none. He is a man of integrity and worthy of great trust.

Anthony C. Caruso, Managing Partner at Caruso and Company, CPA, P.A.Caruso and Company, CPA, P.A.

True Security Expert

Michael is always available to discuss our network security needs and immerses himself in the details. If we ever had a a question or issue he personally involved himself in the resolution. Michael is also very willing to help educate and provide critical knowledge transfer to ensure that his clients had a clear understanding of the services he provided and the technology behind it. A true security expert.

James Voros, Vice President of IT, Greenwich AssociatesGreenwich Associates

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy