Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Post-Assessment Discussion of General Business & Computer Security Risks


Following the delivery of the printed reports, we'll discuss what you can do to create workable security and "acceptable use" policies for your business.

We'll also go over some steps you should take to safeguard your customer information in electronic and printed form to comply with current and forthcoming California law:
  SB-1386 California Security Breach Information Act, which went into effect in 2003;
  SB-1 California Financial Privacy Act, which went into effect July 2004;
  AB-1950 California General Security Standards for Business went into effect January 2005 - this includes (but is not limited to) personal information that a business retains as part of its internal customer account or for use in transactions with the person to whom the information relates.



 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices