ERE Information Security Auditors
Home | Site Map | Contact Us | Cyber Security News | Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Laptop and roving Technology

One of the most prevalent forms of introducing security vulnerabilities into an enterprise network is by the introduction of unsecured roving technology.  Telecommuters, travelling staff, and visitors can all inadvertently infect a corporate network. Internet related threats such as Trojans, viruses, and malware, on their way to the corporate network, initially infect unsecured technology such as:
  • Laptops.
  • PDAs.
  • Blackberries, particularly with text messaging fully implemented.
  • Removable memory sticks.
  • CDs.
  • DVDs.

Methodology
ERE performs a security audit on roving technology by manually assessing the security configuration of a sample of devices while on site at a client’s premises.  We suggest that the client implement the recommendations in the audit report across the rest of the population of technology, as appropriate.

 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

https://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button