This document outlines strategies for securing a business's technology plan. It discusses assessing threats like phishing, spyware and data leakage. It recommends implementing access controls, asset protection, policies and procedures, and data protection technologies like server virtualization and online backups. The goal is to increase awareness of threats, understand pressures on IT, and implement proper protection strategies for issues like rising energy costs and resource constraints. The document provides questions and answers to help businesses develop a secure technology plan.
2. Installing confidencein your network We are Trusted Technology Advisors for small and mid-sized businesses throughout the NYC metro area. We design, install and maintainMicrosoft Windows based networks. We help customers who are… Overwhelmed or confused by technology problems. Frustrated by poor and unresponsive support. Feeling helpless when faced with new IT challenges. www.pro-comp.com 2