user_mobilelogo

Security Leader

I have recruited Data Security leaders since the early 80’s. Mike Scheidell is at the top of his profession. There is no challenge too big or too complicate for this industry guru. He has provided my organization with state of the art protection and I have never heard from him or his team “we can't do that”. An old story comes to mind, in the early 80’s I asked Mike if he knew how to provide my company a simple solution to a very complicated issue we had that appeared to be over the top. His answer was “no…, but I can figure it out”. And he did.

Steve Mersand, CEO Jon Harvey Associates, Incon Harvey Associates, Inc

Highly knowledgeable

Michael is highly knowledgeable in the cyberspace security field.

I was able to attend a workshop that Michael served as panel member, at FIU during the 2013 South Florida PMI's Day of Excellence. His insight sparked great interest and awareness on the various threats and measures that IT practitioners and organizations must consider to address and protect that data assets. What I admire the most about Michael is his ability to share his knowledge and provide sound best practices that will help in being successful IT professionals. For this and many other reasons, I greatly recommend Mr. Michael Scheidell.

Greg Chavarria, PMI, ITIL, CISSP.  Private Sector IT Director

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy