Customer Logins Security Policy
Create separate logins for all customers, whether for NAS shares, email, AD, etc. Users should never share logins.
Related Articles
Cyber Security Incident Response Plan
Cyber Security Incident Response Plan (for Incidents Internal to GGIT) This document describes the steps to be taken during a cyber security incident response. For purposes of this plan, our Security Team consists of Roberta and Matthew. You can ...
Instructions for Customer to Bypass Mac Security Setting to Install ScreenConnect or any Other Software
General Instructions for Customer on Bypassing Mac Security Setting For Installing ScreenConnect or Any Other Software Not Approved By Apple Open your Mac's System Preferences (by clicking on the Apple logo on the top left corner of your screen) and ...
Policy on Employee Use of Artificial Intelligence
Purpose: To ensure that employees use AI applications responsibly while safeguarding confidential information and personally identifiable information (PII). Nothing that, bundled with other information found elsewhere, has the remotest possibility of ...
New Prospect and Client Intake Instructions (New Customer)
This procedure applies to inactive customers in AT as well as to customers that have not opened a ticket or been billed by us in at least one year. They are to be treated as new customers. The only difference is that instead of creating the account ...
Customer Reports Workflow
Workflow On the first of the month we have scheduled all Datto RMM reports to send with "Scheduled RMM Report: " followed by Autotask/Datto Company Name in subject. Recipient: Info@nygeekgirls.com . A PowerAutomate rule (RMMREPORTFIX1) processes the ...