SlideShare una empresa de Scribd logo
1 de 19
Infrastructure, Security, and IT Support
for Independent Insurance Agents
Agency Solutions
Agency Solutions
Welcome
Tony Dials Brian Shell Eric Goldberg
ComResource
Chief Technology Officer
ComResource
Director of Systems,
Network & Security
ComResource
Agency Solutions
Engineer
Agency Solutions
Who We Are
v
• IT Solutions company based in Columbus, OH
• Over 25 years of industry experience
Agency Solutions
Our History with Nationwide
• Leading deployments for 25+ years
• Helpdesk, support, development, project
management
• Connections and Staff widespread at the
company
• Integral roles of the current agency
infrastructure
• Led the FL Independent Agent Email Migration
Agency Solutions
• Device Protection
• Network Protection
• Software Protection
• VOIP Protection
• Government Compliancy
Cybersecurity
• Device Protection
• Network Protection
• Software Protection
• VOIP Protection
• Government Compliancy
• Incident Response Plan
• Disaster Recovery
• Audit trail
Cybersecurity Event means any act or attempt,
successful or unsuccessful, to gain unauthorized
access to, disrupt or misuse an Information System
or information stored on such Information System.
- New York Department of Financial Services
Agency Solutions
Agency Solutions
Cybersecurity Stats
$200,000
Average impact on
companies
60% of Attacks
due to employee/
management negligence
43% Cyber Attacks
target small businesses
62% of Phishing
steal at least one user logon
68% of SMBs
have no
disaster recovery plan
1 in 323 Emails
are malicious
Partner with a Trusted IT Company
"If you spend more time on coffee than on IT security, you will be hacked.
What’s more, you deserve to be hacked.”
- Richard Clarke, White House Cybersecurity Advisor, 1992-2003
"It takes 20 years to build a reputation and few minutes of cyber-
incident to ruin it.”
- Stéphane Nappo, Global CISO at Société
"There was this absolutely horrible moment where I realized there
was absolutely nothing at all that I could do.”
- Amy Pascal, Former CEO of Sony Pictures
Agency Solutions
Cybersecurity Breach Fallout
Recovery cost and time increases exponentially during and
after the event
Agency Solutions
What Should You Expect from Your
Cybersecurity MSP?
Ability to off-load IT Tasks
Expertise in multiple industries
Trained & focused Subject Matter Experts
Skilled in Networking, Email, Wireless, PC, Firewall, VPN & Security
Cybersecurity best practice protocols
Continuous monitoring and maintenance of your environment
Cybersecurity Program Each Covered Entity shall
maintain a cybersecurity program designed to protect
the confidentiality, integrity and availability of the
Covered Entity’s Information Systems.
- New York Department of Financial Services
Agency Solutions
Agency Solutions
New York Compliancy Regulations
https://www.dfs.ny.gov/docs/legal/regulations/adoptions/dfsrf500txt.pdf
Cybersecurity Policy
Data Retention
Disaster Recovery
Cybersecurity Event Notification
(within 72 hours)
Incident Response Plan
Control Access Privileges
Application Security
Risk Assessment
Training and Monitoring
Multi-Factor Authentication
Encryption of Nonpublic
Information
Violations can incur fines of $250,000 or one
percent of total banking assets.
Agency Solutions
Critical Next Steps:
1. Manage access privileges
2. Cybersecurity event notification
3. Third-party provider security policy*
* If you are not supported by an experienced MSP, your cost may be greater, and you
may not be able to recover your systems
When a Breach Occurs…
Agency Solutions
Virginia Insurance Data Security Act
Cybersecurity Program
Cybersecurity Event
Investigation
Cybersecurity Event
Notification to Commissioner
Cybersecurity Event
Notification to Impacted
Consumers
The Act is Effective
July 1st, 2020
Agency Solutions
How ComResource Can Help!
Setup hardware policies and practices​
Establish the proper security for devices, software, and collaboration​
Review current infrastructure and assess weaknesses​
Assess the proper licenses and security templates​
Setup Multi-Factor Authentication(MFA)​
Setup encryption procedures​
Review data retention, backup procedures, and Data Recovery
options​
Agency Solutions
https://bit.ly/AgencySolutions
Powered by
Agency Solutions
The Implementation Process
-
Assess
• Online Assessment
• Customized Phone Survey
Estimate
• Cost Summary
• Timeline Estimate
Implement
• Infrastructure Delivery
• Training / Education
Support
• Engagement Model
• Create Support Procedures
Agency Solutions
Let’s Get Started
If you would like to see how ComResource can help
your agency, start your Agency assessment here
Or direct email: agencysolutions@comresource.com
Agency Solutions
Appendix: Assessment Focus Areas
• Information Security (antivirus and firewall, passwords)
• Data Governance and Classification (what types of data do you store and where)
• Asset Inventory and Device Management (physical count of computers)
• Access Controls and Identity Management (passwords and who has access)
• Business Continuity and Disaster-Recovery Planning and Resources (backups)
• Systems Operations and Availability Concerns (procedures if you are hacked)
• Systems and Network Security (antivirus and firewall)
• Systems and Network Monitoring (antivirus and firewall)
• Systems and Application Development and Quality Assurance (antivirus and firewall)
• Physical Security and Environmental Controls (locked doors, logging off at night)
• Customer Data Privacy (require passwords)
• Vendor and Third-Party Service Provider Management (assurances that your partners are secure)
• Risk Assessment (above)
• Incident Response (above)

Más contenido relacionado

La actualidad más candente

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 

La actualidad más candente (20)

Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 

Similar a ComResource - NW Agent Cybersecurity

Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
tsaiblake
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 

Similar a ComResource - NW Agent Cybersecurity (20)

Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Isms3
Isms3Isms3
Isms3
 
computer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems auditcomputer security audit ,erp audit,software systems audit
computer security audit ,erp audit,software systems audit
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 

Último

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

ComResource - NW Agent Cybersecurity

  • 1. Infrastructure, Security, and IT Support for Independent Insurance Agents Agency Solutions
  • 2. Agency Solutions Welcome Tony Dials Brian Shell Eric Goldberg ComResource Chief Technology Officer ComResource Director of Systems, Network & Security ComResource Agency Solutions Engineer
  • 3. Agency Solutions Who We Are v • IT Solutions company based in Columbus, OH • Over 25 years of industry experience
  • 4. Agency Solutions Our History with Nationwide • Leading deployments for 25+ years • Helpdesk, support, development, project management • Connections and Staff widespread at the company • Integral roles of the current agency infrastructure • Led the FL Independent Agent Email Migration
  • 5. Agency Solutions • Device Protection • Network Protection • Software Protection • VOIP Protection • Government Compliancy Cybersecurity • Device Protection • Network Protection • Software Protection • VOIP Protection • Government Compliancy • Incident Response Plan • Disaster Recovery • Audit trail
  • 6. Cybersecurity Event means any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on such Information System. - New York Department of Financial Services Agency Solutions
  • 7. Agency Solutions Cybersecurity Stats $200,000 Average impact on companies 60% of Attacks due to employee/ management negligence 43% Cyber Attacks target small businesses 62% of Phishing steal at least one user logon 68% of SMBs have no disaster recovery plan 1 in 323 Emails are malicious
  • 8. Partner with a Trusted IT Company "If you spend more time on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” - Richard Clarke, White House Cybersecurity Advisor, 1992-2003 "It takes 20 years to build a reputation and few minutes of cyber- incident to ruin it.” - Stéphane Nappo, Global CISO at Société "There was this absolutely horrible moment where I realized there was absolutely nothing at all that I could do.” - Amy Pascal, Former CEO of Sony Pictures
  • 9. Agency Solutions Cybersecurity Breach Fallout Recovery cost and time increases exponentially during and after the event
  • 10. Agency Solutions What Should You Expect from Your Cybersecurity MSP? Ability to off-load IT Tasks Expertise in multiple industries Trained & focused Subject Matter Experts Skilled in Networking, Email, Wireless, PC, Firewall, VPN & Security Cybersecurity best practice protocols Continuous monitoring and maintenance of your environment
  • 11. Cybersecurity Program Each Covered Entity shall maintain a cybersecurity program designed to protect the confidentiality, integrity and availability of the Covered Entity’s Information Systems. - New York Department of Financial Services Agency Solutions
  • 12. Agency Solutions New York Compliancy Regulations https://www.dfs.ny.gov/docs/legal/regulations/adoptions/dfsrf500txt.pdf Cybersecurity Policy Data Retention Disaster Recovery Cybersecurity Event Notification (within 72 hours) Incident Response Plan Control Access Privileges Application Security Risk Assessment Training and Monitoring Multi-Factor Authentication Encryption of Nonpublic Information Violations can incur fines of $250,000 or one percent of total banking assets.
  • 13. Agency Solutions Critical Next Steps: 1. Manage access privileges 2. Cybersecurity event notification 3. Third-party provider security policy* * If you are not supported by an experienced MSP, your cost may be greater, and you may not be able to recover your systems When a Breach Occurs…
  • 14. Agency Solutions Virginia Insurance Data Security Act Cybersecurity Program Cybersecurity Event Investigation Cybersecurity Event Notification to Commissioner Cybersecurity Event Notification to Impacted Consumers The Act is Effective July 1st, 2020
  • 15. Agency Solutions How ComResource Can Help! Setup hardware policies and practices​ Establish the proper security for devices, software, and collaboration​ Review current infrastructure and assess weaknesses​ Assess the proper licenses and security templates​ Setup Multi-Factor Authentication(MFA)​ Setup encryption procedures​ Review data retention, backup procedures, and Data Recovery options​
  • 17. Agency Solutions The Implementation Process - Assess • Online Assessment • Customized Phone Survey Estimate • Cost Summary • Timeline Estimate Implement • Infrastructure Delivery • Training / Education Support • Engagement Model • Create Support Procedures
  • 18. Agency Solutions Let’s Get Started If you would like to see how ComResource can help your agency, start your Agency assessment here Or direct email: agencysolutions@comresource.com
  • 19. Agency Solutions Appendix: Assessment Focus Areas • Information Security (antivirus and firewall, passwords) • Data Governance and Classification (what types of data do you store and where) • Asset Inventory and Device Management (physical count of computers) • Access Controls and Identity Management (passwords and who has access) • Business Continuity and Disaster-Recovery Planning and Resources (backups) • Systems Operations and Availability Concerns (procedures if you are hacked) • Systems and Network Security (antivirus and firewall) • Systems and Network Monitoring (antivirus and firewall) • Systems and Application Development and Quality Assurance (antivirus and firewall) • Physical Security and Environmental Controls (locked doors, logging off at night) • Customer Data Privacy (require passwords) • Vendor and Third-Party Service Provider Management (assurances that your partners are secure) • Risk Assessment (above) • Incident Response (above)

Notas del editor

  1. We have a webinar and small presentation on getting the right security setup for your office also.