Danger lurks in your business network every single day

Innovative Business Concepts cyber-security programs bring your business a comprehensive, network-wide protection from malware, spam, viruses and hack attacks. Because the best time to ensure data security — and the integrity of your entire business network — is before an infection begins.

PHASE I: EVALUATION + AUDIT

Document and evaluate existing network configuration:

  • Assess entire network 24/7 using monitoring software for one week.
  • Create an inventory list of all network connected systems.
  • Make a customized network configuration diagram.
  • Identify Operating System(s) used; research update policy on each.
  • Confirm current status of Operating System updates.

PHASE II: ASSESS VULNERABILITY

Strengthen network edge protection:

  • Determine current delivery methods for Internet connection.
  • Evaluate router security.
  • Analyze firewall and firewall settings.
  • Assess company’s existing anti-virus & anti-malware email barriers.
  • Create a coordinated protection plan, both internal and external.

PHASE III: INTERNAL NETWORK

Optimize internal network security:

  • Check for user and password control.
  • User security awareness and training.
  • Examine physical access control per workstation.
  • Determine Company’s policy on removable devices.
  • Evaluate anti-virus and anti-malware endpoint protection.

PHASE IV: REMOTE ACCESS

Evaluate remote access security:

  • Identify remote cccess methods in use.
  • Scope check of LAN & internal public devices such as public servers, outside-fed web servers, EDI systems.

PHASE V: MOBILE & WIRELESS

Audit all mobile and wireless devices:

  • Verify security methods in use on wi-fi connections.
  • Scan for pirated device and connections.
  • Determine range of wi-fi connectivity.
  • Enforce company’s newly-updated policy on wireless devices.

PHASE VI: BUSINESS CONTINUITY

Ensure no downtime to maintain safety moving forward:

  • 100% runtime for business continuity.
  • Determine onsite Data Backup policy currently in use.
  • Update onsite Data Backup technologies to maximize effectiveness.
  • Evaluate & optimize new off-site backup policy.
  • Final check of backup programs to eliminate any shortcomings.