8
Sep
2016

- Acceptable use policy, to specify what types of network activities are allowed and which ones are prohibited
- E-mail and communications activities, to help minimize problems from e-mails and attachments
- Antivirus policy, to help protect the network against threats like viruses, worms, and Trojan horses
- Identity policy, to help safeguard the network from unauthorized users
- Password policy, to help employees select strong passwords and protect them
- Encryption policy, to provide guidance on using encryption technology to protect network data
- Remote access policy, to help employees safely access the network when working outside the office
How do I ensure that my company is following Best Practices?
The most effective tool is an IT Security Assessment. BAI’s IT Assessment tools are rated as the best in breed by Gartner Group and Forester Research, and we use industry best practices as defined by The Information System Audit and Control Organization (ISACA). All of our assessments include:- Vulnerability and Penetration Testing
- Extensive Firewall Evaluation
- Social Engineering Evaluation
- Antivirus Best Practices Evaluation
- Network Security Best Practices Evaluation
- Remote Location (Branch) Evaluation
- Remote Access Evaluation
- Telco-Testing / War-Dialing Evaluation
- Wireless Security Evaluation