Cyber Security
Danger lurks in your business network every single day
Innovative Business Concepts cyber-security programs bring your business a comprehensive, network-wide protection from malware, spam, viruses and hack attacks. Because the best time to ensure data security — and the integrity of your entire business network — is before an infection begins.

PHASE I: EVALUATION + AUDIT
Document and evaluate existing network configuration:
- Assess entire network 24/7 using monitoring software for one week.
- Create an inventory list of all network connected systems.
- Make a customized network configuration diagram.
- Identify Operating System(s) used; research update policy on each.
- Confirm current status of Operating System updates.

PHASE II: ASSESS VULNERABILITY
Strengthen network edge protection:
- Determine current delivery methods for Internet connection.
- Evaluate router security.
- Analyze firewall and firewall settings.
- Assess company’s existing anti-virus & anti-malware email barriers.
- Create a coordinated protection plan, both internal and external.

PHASE III: INTERNAL NETWORK
Optimize internal network security:
- Check for user and password control.
- User security awareness and training.
- Examine physical access control per workstation.
- Determine Company’s policy on removable devices.
- Evaluate anti-virus and anti-malware endpoint protection.

PHASE IV: REMOTE ACCESS
Evaluate remote access security:
- Identify remote cccess methods in use.
- Scope check of LAN & internal public devices such as public servers, outside-fed web servers, EDI systems.

PHASE V: MOBILE & WIRELESS
Audit all mobile and wireless devices:
- Verify security methods in use on wi-fi connections.
- Scan for pirated device and connections.
- Determine range of wi-fi connectivity.
- Enforce company’s newly-updated policy on wireless devices.

PHASE VI: BUSINESS CONTINUITY
Ensure no downtime to maintain safety moving forward:
- 100% runtime for business continuity.
- Determine onsite Data Backup policy currently in use.
- Update onsite Data Backup technologies to maximize effectiveness.
- Evaluate & optimize new off-site backup policy.
- Final check of backup programs to eliminate any shortcomings.