1 / 9

Tech Time

Tech Time. Implementing Technical Safeguards to support Your Policies. Thoughts on Technology Issues for Small Business. Security. Security. Have we mentioned that data security is absolutely critical to your business?. Implementing Your Policies Using Strong Technical Safeguards.

jeff
Download Presentation

Tech Time

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tech Time Implementing Technical Safeguards to support Your Policies Thoughts on Technology Issues for Small Business

  2. Security. Security. Have we mentioned that data security is absolutely critical to your business?

  3. Implementing Your Policies Using Strong Technical Safeguards Technical Safeguards Can it be stressed enough… Data security must be part Of your overall business strategy!

  4. Technical Safeguards to Implement • Active Directory • Users, Groups, Domains, Organizational Units • Group Policy • Grant Software usage authorization • Prevent unauthorized download of data • Access Control Lists (ACLs) • Restrict data access by user name • Restrict data access by groups and roles. • Technical Safeguards

  5. Sample Policies • A. All employees will only use the user name assigned by the Infrastructure Manager. Employees will not share their user name or password with other employees without the express written permission of their supervisor. • B. Employees will create a password in accordance with the guidelines established by the Infrastructure Manager. All passwords are a minimum of 13 characters long and must contain at least one special character, one uppercase letter, one lowercase letter and one numeric character. Passwords are set to expire every 90 days and cannot be reused for five password cycles. • C. Employee’s will save all files to the Company’s central file server storage area. That storage are is current Z:\Company Files\. No files are to be stored on local devices. • AdministrativePolicies

  6. Some Steps to take • For A. Create unique user names in Active Directory. Eliminate shared role-based user names. • For B. Implement password complexity rules in Active Directory. • For C. Implement Group Policy to script authorized software permissions, authorized file storage areas for users and to prevent data from being downloaded to individual computers. • Technical Safeguards

  7. As Business Information as a Service, we deliver a highly secured, managed and hosted server for business • One place for your applications and your data • Documents stored securely • Nothing local therefore device loss is not crippling • The goal is to have access to data on demand • One place for all your data makes everyone more effective • 24/7 monitoring of entire system • 24/7 tech support to keep your applications running • Fully managed for you so you can work on your business Argentstratus Anywhere

  8. Business is no longer tied to traditional offices • Home-based employees • Mobile employees • Customer needs change constantly • Customers are everywhere and want better information • Your business can no longer afford • To act on inaccurate data • Have employees doing their own thing and reinventing process • To shoot from the hip and made decisions on instinct Why all this is Important

  9. Contact us from Anywhere • Email: info@argentstratus.com • Website: www.argentstratus.com • Toll free: 888.229.6207 • Portland:503.980.1434 • Vancouver:360.637.4034 For more information

More Related