Cyber Security Incident Response Plan
Related Articles
Instructions for Customer to Bypass Mac Security Setting to Install ScreenConnect or any Other Software
General Instructions for Customer on Bypassing Mac Security Setting For Installing ScreenConnect or Any Other Software Not Approved By Apple Open your Mac's System Preferences (by clicking on the Apple logo on the top left corner of your screen) and ...
Managed Services and How to Find More info about Customer Contracts
This is a general guide to the services we offer. These divisions are flexible, as we try to meet the needs of the individual customer when we propose a managed services offering: Most of the terms used here are common in our industry. A quick Google ...
Creating a Maintenance Plan Proposal
Geek Girls IT Team Site - Documents\Service Offerings\RMM\Business\Cover Sheets Add prospect name and logo to cover Print a page (just page 1) Choose WinPDF Creator Make sure to close PDF so that the second page can be appended. Open the RMM services ...
Internal Security Policies and Procedures
Security Policies 1. Employees must use 2FA for all logins for which it's available. Where Duo is not available, employees must use stand-alone 2FA. Whenever possible, the use of 2FA is enforced. 2. Employees must use complex passwords that are at ...
Business Continuity Plan (in progress)
In case of emergency, if Roberta becomes incapacitated, etc. Roberta's Keeper Securitry master password is located in the blue safe in the console in the front alcove on the first floor of the 666 Chestnut Ave house. Billy has the key to the safe. ...