user_mobilelogo

Diversity of Experience

Passionate, hard-working and exciting; that's how I'd describe Michael in the work place. He has a unique way of viewing products, creating and inventing unique solutions in security...products that no one else could imagine and then take to market. In addition, his diversity of experience brings something extremely valuable to the table which cannot be ignored. Michael is a true professional. I enjoyed working with him.

Mike Floyd, Director Business Development at ASCEND Software Solutions Pvt Ltd

Only The Best

Michael is very skilled at what he does - he knows the IT Security landscape as well as anyone out there. He has helped me with issues we were having when no one else could. I recommend him to anyone looking for "only the best".

John Christly, CISO, Chief Information Security Officer/Executive Director/HIPAA Security Officer, Nova Southeastern UniversityNova Southeastern University

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy