Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software


Includes verification that your installed anti-virus and anti-spyware software are properly configured for automatic virus and adware/spyware definition updates & scanning. 

  If you don't have any anti-virus or anti-spyware software installed, we can help you select and obtain software from reputable sources.

If malicious software is detected on a system, this will be immediately brought to your attention and a plan will be developed to address the problem.

  Removal of viruses and other malicious software is performed on a "best effort" basis using customer's licensed anti-virus software or other tools as needed.

  For severely infected systems where removal is projected to require more than 4 hours, it is often better to backup the data files, re-install the operating system and applications to ensure maximum system stability, then install updated anti-virus and anti-spyware software to scan data files as they are restored from the backup.



 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices