When designing your business's network practices, have written documentation of everything. Every program you buy, every upgrade you install, and every modification you make needs to be documented. Also, you should have written policies on how to react before, during, and after any security breach is discovered.
Your policies should be updated frequently, and cover such items as:
Follow these guidelines to minimize your business's risk of intrusion.
Check our calendar for C-SAFE classes and important training events. Subscribe in your Google calendar.