Most IT departments and personnel staff are so preoccupied with multiple projects, that they tend to overlook important security measures. TelPlus can perform an Intrusion Audit to evaluate your current configuration and determine where vulnerabilities might exist. TelPlus acts as an extension of your IT department and works closely with you by communicating every aspect and detail. To ensure trust and integrity, both parties will execute a non-disclosure / confidentiality agreement and steps will be approved and documented prior to the complimentary audit.
CREATING A SECURITY PERIMETER
The first step in conducting an audit is to create a master list of the assets your company has, in order to later decide upon what needs to be protected through the audit. While it is easy to list your tangible assets, things like computers, servers, and files, it becomes more difficult to list intangible assets. To ensure consistency in deciding which intangible company assets are included, it is helpful to draw a “security perimeter” for your audit.
INTRUSION AUDIT ‘THREATS LIST’
You can’t protect assets simply by knowing what they are; you also have to understand how each individual asset is threatened. So in this stage we will compile an overall list of threats which currently face your assets.
- TESTING VULNERABILITIES
- IMPLEMENTING INTRUSION PREVENTION
- TESTING BACKUPS
- EMAIL PROTECTION & FILTERING
- PREVENTING PHYSICAL INTRUSIONS
- IMPLEMENTING IDENTITY & ACCESS MANAGEMENT
These steps to conducting our IT Security Audit will help you a long way towards becoming more aware of the security threats facing your company as well as to begin to develop a plan for confronting those threats. It is important to remember that security threats are always changing, and keeping your company safe will require that you continually assess new threats and revisit your response to old ones.
To receive a confidential and complementary intrusion audit, CLICK HERE or call toll free at 1-866-TELPLUS.