We have a recent off-site backups and current anti-virus on all
desktops and servers.
Off-site tapes and anti-virus
updates protect you from accidentally deleted files or virus
Employees are restricted in their access to our internal network.
Many attacks on IT systems are initiated by
Our Security Policy/Procedure Manual has been audited by an
Experts recommend you have your Security Policy
Manual audited by an outside organization.
Our company has a firewall to protect us.
There are security risks in connecting IT systems to the Internet but firewalls
do have limitations.
We encrypt our confidential documents and E-mail messages.
Encryption prevents third
parties from opening confidential documents or incorrectly addressed
We have an electronic document archival and destruction
Old versions of electronic documents may show up years later when a
lawsuit is filed against your company. An electronic document
archival and destruction management system can help you manage
some of these risks.
We monitor and restrict our employees when they access the
Improve your employee productivity through the use of Internet
monitoring and access restriction software.
An outside organization performed an independent security
assessment of our IT systems.
Systems have limitations. An independent security
assessment may help you close vulnerabilities.
We have the resources to tell if someone has broken into our
Intruder detection systems monitor your
network for unauthorized access.
It is possible to distinguish an intruder from normal traffic.
24 hour monitoring of network
sensors helpdistinguish intruders from normal traffic.