Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Check Hardware Router or Firewall for proper settings and Security Best Practices:


A hardware router/firewall provides necessary protection for your network when you have an "always-on" connection to the internet, but only if it has been correctly configured.

  We will check if any upgrades are available for your router/firewall to provide additional security features or correct any vulnerabilities. (Some feature upgrades may require purchase of an upgrade kit or a software unlock key from the manufacturer and are not covered by this special pricing.)

  We will attempt to configure the router/firewall to incorporate as many security best practices as it is capable of supporting (a process known as "hardening"), and will advise you if we believe that continued use of that particular router/firewall poses an unacceptably high security risk to your company.

 
We will check to see if the router/firewall system login account is still using the factory default account name and password.  We will work with you to choose more a secure password and to change the login account name, if supported by your device, to a name that is not as easily guessed by an intruder.

 
We will verify that the software firewall settings on your desktop systems are providing a second layer of protection against both external attacks and attacks that could be launched from other computers on your internal network.



 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices