I.B.C. - Innovative Business Concepts | 310.617.0300 | Cyber-Security

Phone

310-617-0300

 

HQ

880 W. 1st Street

Los Angeles, CA 90012

Copyright Innovative Business Concepts, Inc. and ConciergeITservices.com.   All rights reserved.

  • Innovative Business Concepts
  • Google+ | IBC1.com

IBC CYBER-SECURITY PROGRAMS BRING YOUR BUSINESS COMPREHENSIVE, NETWORK-WIDE PROTECTION FROM MALWARE, SPAM, VIRUSES & HACK ATTACKS.

PHASE I: 
EVALUATION + AUDIT

Document and evaluate existing network configuration:

 

• Assess entire network 24/7 using monitoring software for one week.

• Create an inventory list of all network connected systems.

• Make a customized network configuration diagram.

• Identify Operating System(s) used; research update policy on each.

• Confirm current status of Operating System updates.

PHASE III: 
INTERNAL NETWORK

Optimize internal network security:

 

• Check for user and password control.

• User security awareness and training.

• Examine physical access control per workstation.

• Determine Company’s policy on removable devices.

• Evaluate anti-virus and anti-malware endpoint protection.

Customized support for ERP/Accounting software  | 310-617-0300
PHASE II: 
ASSESS VULNERABILITY

Strengthen network edge protection:

 

• Determine current delivery methods for Internet connection.

• Evaluate router security.

• Analyze firewall and firewall settings.

• Assess company’s existing anti-virus & anti-malware email barriers.

• Create a coordinated protection plan, both internal and external.

PHASE IV: 
REMOTE ACCESS

Evaluate remote access security:

 

• Identify remote cccess methods in use.

• Scope check of LAN & internal public devices such as public
    servers, outside-fed web servers, EDI systems.

PHASE V: 
MOBILE & WIRELESS 

Audit all mobile and wireless devices:

 

• Verify security methods in use on wi-fi connections.

• Scan for pirated device and connections.

• Determine range of wi-fi connectivity.

• Enforce company’s newly-updated policy on wireless devices.

PHASE VI: 
BUSINESS CONTINUITY

Ensure no downtime to maintain safety moving forward:

 

• 100% runtime for business continuity.

• Determine onsite Data Backup policy currently in use.              

• Update onsite Data Backup technologies to maximize effectiveness.

• Evaluate & optimize new off-site backup policy.

• Final check of backup programs to eliminate any shortcomings.