Friday, October 18, 2019

Computer Security Policies Essay Example | Topics and Well Written Essays - 1000 words

Computer Security Policies - Essay Example The Reston, VA site has 1 on site senior consultant, 4 in-house junior consultants and 2 remote field consultants while our Annapolis, MD comprises 1 onsite senior consultant, 4 in-house junior consultants and 3 remote field consultants. Like our headquarters personnel, our offsite staff have years of ICT experience and industry-level certifications such as CISSP, CISA, PMP and others. To meet the growing needs of our increasing client base, we are expanding our ICT staff to add 14 onsite in-house employees and 6 remote field consultants. This future growth expansion is happening now and will be complete in six months time to truly serve all your ICT needs. Our current infrastructure consists of 1 domain controller server, 1 server for the finance department and 1 server for Web/email as well as secure remote access in the DMZ. In the months to come, we will add more hardware infrastructure to meet the growing demands of our ICT consulting and implementation services. To further enhance our capabilities aside from our modern infrastructure and certified personnel, our company has started the â€Å"road map† to ISO 17799/27001 – Code of Practice for Information Security Management and Information Security Management Systems certification. This is a globally-recognized information security certification that ensures a company practices globally-accepte d and best practices in information security – all our corporate policies are based on this ISO standards. ADDITIONAL GUIDANCE: The arrangements you make for maintaining your equipment, whether through on-site support or off-site support. Information Security issues to be considered when implementing your policy include the following: ADDITIONAL GUIDANCE: Office software forms a critical link between the primary business systems in your day to day work. The initial choice of the office package has far

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.