Documente Academic
Documente Profesional
Documente Cultură
TECH-SEC was founded in 2007 by three novice network engineers, graduated from ITT Technical Institute in San Bernardino California, the company was founded with the motivation of creating a more secure IT environment to companies with low budget. TECH-SEC focuses on vulnerability research and exploitation, network and application security testing, vulnerability assessments, network reviews, and penetration tests.
TECHSEC
The risk of losing patients information due to poor security measures has created a need for a more efficient way of attending to protection of personally identifiable information needs in the form of antivirus applications along with state of the art security barriers. This report examines the viability of integrating such a solution into the existing network. A modeling and simulation tool was utilized to evaluate the how well the existing network is meeting Healthcare Nurses Associations current needs and how well it would be able to accommodate future business demands and future growth. The new system upgrade would be the heart of the new consolidated security network infrastructure. The system network would streamline the way patient information will be expedited and processed and enhance the security protection.
TECH-SEC will provide Security Assessment, Penetration and Source Code Review of VNA Hospice. This includes both buildings and networking devices, services and users. This is not limited to third parties or guests. They will also be added to it to provide the best assessment of security and provide solutions to real world problems.
Outdated Hardware Outdated Software Missing Policies Access Controls Monitoring Network Mobile Devices Out of Network. Backup location Users
Upgrade Hardware & Devices with new efficient technology. Create & Implement new policies with detailed information that covers gaps found. Redefine Access Controls & Access Control Policy with missing information. Implement a Monitoring System into the network. Implement Backup System & Backup Facility. Provide Security Awareness Training to all
Compliance
Loss of certification (HIPPA, PCIDSS, )
Data breach
Client information expose, lost of reputation, loss of compliance, Investigation
Legal liability
Law suits, monetary settlements
Financial liability
Costs of courts, cost of investigation, cost of mitigation.
Reputation
Lost reputation, lost of clients, uncertain future
Lost of clients
Lost of financial income, lost of recommendations, lawsuits.
Network infrastructure
Secure rooms, access control
Hardware upgrade
Software upgrades
Upgrade workstations, DRP, servers, routers, firewalls, AP Backup solution wireless, repeaters Cloud backup solutions Workstation OS, Servers OS,
Hardware:
Dell WYSE C90LEW Dell Venue 11 Pro 5130 LTE Dell SonicWALL E-Class SRA EX6000 Dell Force10, S25V ARP Uninterrupted Power Supplies
Software:
Microsoft Office 2010 Terminal Server Licenses Windows 8 for Tablets Apache Linux for Web Server Windows Server 2008 Enterprise Microsoft Outlook
Hardware
Three simultaneous phases Removal Installation Training
Software
Same procedure as hardware Installation Training Follow up & tracking of progress
Guards
Main entrance
Manual locks
Inventory control of all locks