i.e. happiness, joy... 
and Information Security

GET STARTED HERE or send me a Quote

Security is    But What is it?

On the basis of 30 years of security industry experience and knowledge, INTEK created a set of practices, policies and controls that provide effective protection against the most relevant risks.  We call these control recommendations - Base Line Information Security Services.

Base Line Information Security Services are dynamic and continuously updated to reflect newly discovered relevant threats and vulnerabilities.  In the model, the controls are categorized to cover technical, physical and administrative/people/process areas.  

provides a risk profile for each customer which then drives a unique set of services that are most appropriate for the client's environment.  This becomes the security roadmap for the organization, providing specific task guidance, at the device, administrative, and executive level, for a continuing enterprise-wide security program

was built on the concept of self-direction, where the organization manages and directs the information security risk evaluation.   

WHERE DO I START?   Click Here

How secure is your company today?  
Can you prove it?  
Can!

practices, policies and controls address the security requirements for HIPAA and GLBA, and map to a majority of the control clauses in both ISO 17799 best practices and the BS 7799 security standard. 

Base Line Information Security Services are listed below:
Types of Security
Basic Security  
Basic Security Practices to help stop Hackers
Basic Security Awareness Education & Training 
Privacy Protection Guidelines
Privacy Links and Resources
Anti-Virus, SPAM, e-mail, blocking, filtering... 
Protecting Your Internet Connection  
Telephone support for virus resolution
Firewalls, Proxy Servers, Packet Filtering... 
Return on Security Investment 
Intrusion Detection Software...
Methodology for Security
First step to a good Security Plan  
Vulnerability Assessment Services...FREE?
Network Solutions  
Network Security Planning
Risk Analysis
Security Testing & Evaluation
Intelligent Risk Management
Software Compliance Demonstration PDF
Internal Network Assessment
Disaster Recovery
Disaster Planning
Computer Forensics
Risks & Examples
Relationships & Partners

Systems Audit

Smart PC Management Services

PMS Preventive Maintenance Services

Protecting Your Internet Connection

Identify your public internet vulnerabilities

Do it Yourself Security Planning

Telephone Support

Fix-it Yourself Tools

BLISS VA sample report

and more...  Call us anytime, 24x7  314.487.6008

Alice's Adventures in Wonderland

'Would you tell me, please, which way I ought to go from here?'
  

'That depends a good deal on where you want to get to' said the Cat.

"I don't much care  where--' said Alice.

'Then it doesn't matter which way you go,' said the Cat.  '--so long as I get somewhere,' Alice added as an explanation.

'Oh, you're sure to do that,' said the Cat, 'if you only walk long enough.'

We believe you need to KNOW where you are, or what your current level of security is, before you can determine where you want to go, or where security additions, changes, need to be implemented.    is our recommendation to start with.