Security is
But What is it?
On the basis of 30 years of security industry experience and
knowledge, INTEK created a set of practices,
policies and controls that provide effective protection against
the most relevant risks. We call these control recommendations
- Base Line Information Security Services.
Base Line Information Security Services are dynamic and continuously
updated to reflect newly discovered relevant threats and
vulnerabilities. In the
model, the controls are categorized to cover technical, physical and
administrative/people/process areas.
provides a risk profile
for each customer which then drives a unique set of
services that are most appropriate for the client's
environment. This becomes the security roadmap
for the organization, providing specific task guidance, at the device,
administrative, and executive level, for a continuing enterprise-wide
security program
was built on the
concept of
self-direction, where the organization
manages and directs the information security risk
evaluation.
WHERE DO I START? Click Here
How secure is your company today?
Can you prove it?
Can!
practices, policies
and controls address the security requirements for HIPAA and
GLBA,
and map to a majority of the control clauses in both ISO 17799 best
practices and the BS 7799 security standard.
Base Line Information Security Services are listed below:
Types
of Security
Basic Security
Basic
Security Practices to help stop Hackers
Basic Security
Awareness Education & Training
Privacy Protection Guidelines
Privacy Links and Resources
Anti-Virus, SPAM,
e-mail, blocking, filtering...
Protecting
Your Internet Connection
Telephone support
for virus resolution
Firewalls, Proxy Servers, Packet
Filtering...
Return on Security
Investment
Intrusion Detection
Software...
Methodology for
Security
First
step to a good Security Plan
Vulnerability
Assessment Services...FREE?
Network
Solutions
Network Security Planning
Risk Analysis
Security Testing & Evaluation
Intelligent Risk
Management
Software Compliance Demonstration
PDF
Internal
Network Assessment
Disaster Recovery
Disaster Planning
Computer Forensics
Risks
& Examples
Relationships & Partners
Systems Audit
Smart PC Management Services
PMS
Preventive Maintenance Services
Protecting Your Internet Connection
Identify your public internet
vulnerabilities
Do it Yourself Security Planning
Telephone Support
Fix-it Yourself Tools
BLISS VA
sample report
and more... Call us anytime, 24x7 314.487.6008
'Would you tell me, please, which way I ought to go from
here?'
'That depends a good deal on where you want to get to'
said the Cat.
"I don't much care where--' said
Alice.
'Then it doesn't matter which way you go,' said the Cat. '--so long
as I get somewhere,' Alice added as an explanation.
'Oh, you're sure to do that,' said the Cat, 'if you only walk long
enough.'
We believe you need to KNOW where you are, or what your current
level of security is, before you can determine where you want to go, or
where security additions, changes, need to be implemented.
is our recommendation to start with.
|