1 / 11

Outline

Presented By: Group # 7 Renato Feoli Patricio Misitrano. Outline. Company Information. Network Security Policy Situation. Recommendations. Questions and Answers. Company Information.

bella
Download Presentation

Outline

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented By: Group # 7 Renato Feoli Patricio Misitrano

  2. Outline • Company Information • Network Security Policy Situation • Recommendations • Questions and Answers

  3. Company Information • Company founded in 1980 • Located in downtown Winter Haven, Florida • 8 experienced CPA’s and qualified employees • Services in all tax areas for local and international clients • Very low employee turnover

  4. Current Network Policy Situation • No formal network security policy • Practices are communicated during staff meetings • IT manager Paula Taylor in charge of the computer network • Have encountered some problems with employees downloading Adware from the internet

  5. Recommendations • Develop a proper Network security Policy • Use the current practices as a foundation of the policy • Place the policy in the company’s intranet • Make sure all employees understand the policy

  6. Recommendations • Physical access control for the server • Provided a well secure location for the server and other hardware components • Provide proper storage location for software

  7. Recommendations • System security with passwords at all levels • Let employees develop their own passwords • Limit personal folder storage • Accessibility for users needs to be on a need to know basis

  8. Recommendations • Backup tapes security • Separate location to store rotation tapes • Fireproof containers • Apply proper sanctions in case of breaching the security policy

  9. Questions & Answers Presented By: Group # 7 Renato Feoli Patricio Misitrano

  10. Questions & Answers Presented By: Group # 7 Renato Feoli Patricio Misitrano

More Related