Cyber Security Incident Response Plan
Related Articles
Instructions for Customer to Bypass Mac Security Setting to Install ScreenConnect or any Other Software
General Instructions for Customer on Bypassing Mac Security Setting For Installing ScreenConnect or Any Other Software Not Approved By Apple Open your Mac's System Preferences (by clicking on the Apple logo on the top left corner of your screen) and ...
Managed Services and How to Find More info about Customer Contracts
This is a general guide to the services we offer. These divisions are flexible, as we try to meet the needs of the individual customer when we propose a managed services offering: Essential RMM - managed EDR + NGAV (google this if necessary), ...
Creating a Maintenance Plan Proposal
Geek Girls IT Team Site - Documents\Service Offerings\RMM\Business\Cover Sheets Add prospect name and logo to cover Print a page (just page 1) Choose WinPDF Creator Make sure to close PDF so that the second page can be appended. Open the RMM services ...
Internal Security Policies and Procedures
1. Wherever possible, employees must use 2FA. Where Duo is not applicable, employees must use stand-alone 2FA. 2. Employees must use complex passwords that are at least 8 characters long and contain uppercase, lowercase and at least one symbol. 3. ...
Business Continuity Plan (in progress)
In case of emergency, if Roberta becomes incapacitated, etc. Roberta's Keeper Securitry master password is located in the blue safe in the console in the front alcove on the first floor of the 666 Chestnut Ave house. Billy has the key to the safe. ...