FULL OFFICE HELDESK SUPPORT
CALL US: (323) 804-0098 or (805) 205-4533

Network Security

The IT department uses the latest technology and techniques to maintain the highest level of security possible, but we can’t do the job without your help. Every employee plays a critical role in keeping Remodel Works computer network secure. When you log on to your computer, send an e-mail, share a file, or use an instant messaging program, you can help or hurt network security.

Why bother with security?

  • Compromised company information can benefit our competitors and inhibit our success.
  • Hackers and viruses can destroy your work.
  • Your private information can be compromised.
  • Your ability to work can be hampered.
  • You may loose all your data and ability to restore.

What should be kept secure?

Obvious Examples
  • What should be kept secure?
  • Sales department data
  • Research and development data
  • Human resources personnel files
  • Any business information marked Confidential
Less Obvious Examples
  • A senior executive’s contact list
  • Senior executive e-mail messages
  • XYZ direct telephone numbers
  • Personal employee telephone numbers

E-mail and Instant Messaging

  • E-mail represents our single biggest security concern.
  • Viruses are most commonly spread through e-mail attachments.
  • Viruses can also be sent through instant messaging attachments.
  • Confidential information can very easily be accidentally and/or purposefully compromised through both e-mail and instant messaging.

Viruses can come from:

  • E-mail and instant messaging attachments.
  • Infected files shared via removable storage (diskettes, CDs, Zip disks, and other media) or over the network.
  • Software downloaded from the Internet.

Servers

  • Do you have a server? Why or why not?
  • What type of server is your business relying?
  • Do you have Domain Server: A domain server gives you information security, policy-based administration, extensibility, scalability and flexible querying.
  • File Server: Allows to create shared folders and sessions.
  • Web/Media Server or Print Server: You can have a web or ftp site to browse and download or upload. The print server allows you to share the printer in your network and to be shared in different networks.
  • Application Server? Client server applications, Terminal Services, Email Server or Database Server. Application servers can run powerful applications and improve your network.
  • DHCP Server: enables you to assign IP address to TCP/IP clients on your network.
  • DNS, Remote Access or Routing Server? DNS can published Active Directory. Remote Access gives you the ability to access the network remotely or through VPN.
  • Do you know your server capacity?

Backup Your Server

  • It is very important to backup your server at least daily to avoid any system crash. If your system crash for any reason, the only thing that will help you at this time is the backup, nothing and no one can help without this backup.
  • Do you have a backup tape? What are the policies and procedures your company uses to backup your daily work?
  • Have you tested your last backup to see if it’s good and working properly?
  • Do you have a UPS Battery backup for your server?

Network Configuration

  • Network Type. Do you know the type of network you are running? Do you have a Domain network or workgroup network, Novell, etc.?
  • Network Design. Do you know if you are using a network’s architecture which is beyond its capabilities?
  • Network’s Health.Is your network in a good health? What is your network speed? Do you have a good router and hub/switches? What type of net cable are you using?
  • Network Specification. Do you know your network’s specifications, diagrams and IP address? Do you have a static IP or Dynamic internet connectivity?
  • Have you define users and groups to access your database and server resources?
  • Do you know if every employee have a user account to access the network?
  • Do you know who has access to what drives or folders on the server? Do you have a MAP diagram of your drives?
  • Do you have network security policies and procedures?
  • How are you assigning IP address in your network? Are you using NAT, DHCP or static IPs.

Hardware and Peripherals

  • INVENTORY INFORMATION—END USER MACHINES. Use this section to record the model of each component of a user system.
  • NETWORK INFORMATION: If the system is connected to your network, use this section to record the type of network card and any other information you’ll need to identify this system on your network.
  • REPLACEMENT/RETIREMENT INFORMATION: Keep track of system components that you replace.
  • HARDWARE:Is every hardware component on each system working? (e.g. CD-ROM, Floppy, Video Card, Monitor, etc.)
  • INVENTORY INFORMATION—SERVERS. Do you record information about server-class machines, break/fix and disaster recovery planning.
  • LICENSES AND SERVICING. Do you capture warranty information and list the software running on the server, including operating system, monitoring applications for tracking and generating alerts about failures, low-disk capacity, and, of course, antivirus protection.
  • HARDWARE: Do you have the latest drivers for all your computer components such as network cards, video cards, etc. How about your printer drivers?

Firewall Protection

  • SCOPE: Whether your organization has firewalls and a security policy or not, it’s prudent to regularly evaluate your security approach.
  • Does your security team have quick access to this network documentation?Network diagrams, Trending data, Protocol utilization, Data points, Access points.
  • Does your security team know the order in which systems must be restored? The security response team must have a full understanding of which systems need to be restored to full operation and in what order.
  • Have you provided a way of documenting, distributing, and following up on security violation reports?Denied access messages, failed passwords/login attempts, attempts to access back doors.
  • Does your information disclosure policy address the following in relationship to a security issue?What information is shared with others? Is information shared internally, departmentally, externally, etc? Under which circumstances? Who has the authority to initiate information disclosure?

Maintenance Procedures

  • Empty the Recycle Bin. Some users need to be reminded to periodically empty the Recycle Bin.
  • Run Scandisk and defrag the drive as needed.
  • Confirm that backups are being done. Do you have a network solution for automatically backing up user files to a server?
  • Update drivers as needed.Make sure you’ve installed the latest drivers for printers, net cards, video cards, and other devices.
  • Check the operating system and applications.Update your OS and applications with the latest service packs or updates.
  • Check the connections. Users love to move their equipment around.
  • Take inventory. Update your master inventory of computer assets.
  • Check the network hardware.It is also necessary to check and reboot hubs, routers, switches, and print servers from time to time.

Report computer security issues and viruses to the help desk

  • If you believe your computer is behaving unstable, call the help desk.
  • If you receive a suspicious e-mail, call the help desk for instructions.
  • If have been saving your files to the server and can’t find them now, call the help desk..
  • If you put infected media into your computer, the anti-virus software will ask you to eject, scan or format the disk. Eject the disk and contact the help desk.
  • If an infected file is critical, the IT department will attempt to rescue the data. Success is not guaranteed.

How to contact the Help Desk

  1. Telephone

    (866) 582-6676 toll free


  2. E-mail

    support@myofficehelpdesk.com
    To:Help Desk
    Subject:Brief problem description
    Body:Detailed problem description including: location of the problem, number of people affected, severity of problem, and contact information.


  3. Internet

    Click the Help Desklink from XYZ Corporation’s Intranet home page.
    Enter http:\\www.myofficehelpdesk.com and Click on Support to initiate a Support Ticket.

Help desk hours of operation

  • Normal hours of operation 8:00 A.M. to 05:00 P.M. Monday through Friday Pacific Time
  • On-call support for mission critical systems 24 hours a day with contract specifications.