user_mobilelogo

True Security Expert

Michael is always available to discuss our network security needs and immerses himself in the details. If we ever had a a question or issue he personally involved himself in the resolution. Michael is also very willing to help educate and provide critical knowledge transfer to ensure that his clients had a clear understanding of the services he provided and the technology behind it. A true security expert.

James Voros, Vice President of IT, Greenwich Associates

Expertise and Insight

Michael presented at a South Florida ISSA meeting in 2013. His expertise and insight in information security made him an excellent choice for a speaker. His talk was very creative and provided great analogies for the audience to understand and follow along. The talk was well received and Michael has been invited back to speak again.

Jorge A Orchilles, Former President, ISSA, South Florida

The framework of maintaining good security and privacy is developing and updating your organization's internet use and privacy policies and procedures. This requirement is driven by the need to  protect company assets as well as end customer’s privacy and information.

If you have an existing set of policies and procedures which currently address most of the issues, you still may need to update these policies to address current threats and customer requirements.  

We can help you with standard policies either as a group, or individually.  Some example policies that your company should have include:

  • Firewall Policy
  • Anti-Virus Policy
  • Downtime Policy
  • Password Policy
  • Purchasing Policy
  • Help Desk Triage Policy
  • Third-Party Access Policy
  • Server Configuration Policy
  • Software Development Policy
  • Internet Acceptable Use Policy
  • Hardware Asset Disposal Policy
  • Mobile Device Acceptable Use Policy
  • Remote Access Policy
  • Telephony Service Policy
  • Routine COTS Application Policy