Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Check Operating System for Security Vulnerabilities:


Includes scanning your workstations and server (Windows, Macintosh, Linux, or "server appliance") to determine whether the most recent service packs and critical security hotfixes have been installed.

Includes scanning of networked printers or print server appliances which may be vulnerable to exploits.

Includes checking for security updates of popular office suites and selected other applications.

If critical security vulnerabilities are detected, these will be immediately brought to your attention and a plan will be developed to address them.


PLEASE NOTE: The time required to update a particular system can vary depending upon the processor speed, amount of installed memory, amount of available disk space, current level of integrity of your operating system, and speed of your internet connection: older, severely compromised systems can run very slowly.
 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices