user_mobilelogo

Highest Professionalism

I have had the pleasure of working with Michael and his team over the last ten years. Under his leadership, I received the highest professionalism. On a personal level, Michael is a great to work with. He has a clear understand of the security industry and what is expected by the business community. He has innovative approaches and solutions.

Read more ...

Thought Leader

Michael is a thought leader in the industry. He provides a superior product and service at a cost that cannot be replicated by tradition means. He is knowledgeable, ambitious, and always willing to help.

Brian Pecjo, Director, Information Technology at Harvard Clinical Research InstituteHarvard Clinical Research Institute

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy