Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
business , compliances

How to pretend to be succesful in IT Today

July 1, 2009

Items to Consider Target Behaviors: Analysis and Problem Solving 1        Follows technical interrelated sets of complex issues without difficulty 2        Asks clarifying and shaping questions geared towards thoroughly assessing critical issues 3        Demonstrates creative and occasionally innovative approaches to information gathering within a structured framework 4        Able to enlist...

Img
business , compliances , information-rights-management , security

Securing the confidentiality of PHI

March 8, 2009

PHI (Protected Health Information) requires passwords but…. a) Easy-to-guess passwords are one of the top ten threats to network security b) When passwords change often to improve security, users write them down, increasing the risk of a breach In addition, employers must block terminated staff from continued access to systems...

Img
compliances , policies , security

Why should I bother with a Security Policy?

February 14, 2009

The image that most frequently comes to mind when discussing security is that of the great firewall standing guard at the opening to your network, fending off attacks from malevolent hackers. Although a firewall will play a crucial role, it is only a tool that should be part of...

Img
compliances , information-rights-management , security , web-services

Identity Management Glossary of Terms

January 8, 2009

Acquisition device: The hardware used to acquire biometric samples. Acquisition device: The hardware/sensors used to acquire biometric samples. These would include finger sensors or readers, iris scanning devices, facial recognition cameras. Automated Fingerprint Identification System (AFIS): A system that compares a single fingerprint with a database of fingerprint images....

Img
compliances , information-rights-management , security

Download Free – Data Research References

June 28, 2008

Excellent data references: Overview Architecture for Enterprise Data Warehouses Data Warehouse Documentation Roadmap Data Warehouse Database Reference Manual How Data Works We think this was an excellent site with excellent resources: http://www.datamgmt.com

Img
compliances , security

PCI Carholder Information Security Program

June 11, 2008

Carholder Information Security Program. European Payment Council (EPC). Securing Visa Cardholder Data When customers offer their bankcard at the point of sale, over the Internet, on the phone, or through the mail, they want assurance that their account information is safe. That’s why Visa USA has instituted the Cardholder...

Img
compliances , sample-it-spreadsheets , security , web-services

What is an Application Audit

May 7, 2008

What is an Application Audit Usually required to assess • Business risk• Internal control• Strong linkage to corporate governance and compliances such as SOX, PCI, HIPAA and GLBA It is an audit of a single application • Example: audit of an Excel spreadsheet with embedded macros It could also be an...

Img
compliances , networking , security

Common Referenced Related Laws, Regulations, and Policies

January 11, 2008

The following Federal laws, directives, regulations provide guidance pertaining to the security automated information systems: Privacy Act of 1974 (Public Law [PL] 93-579, United States Code [U.S.C.] 552A) Freedom of Information Act (5 U.S.C.522) Paperwork Reduction Act of 1986 (44 U.S.C. 35) Electronic Communications Privacy Act of 1986 (PL...

Img
compliances , security

Information Technology Requirements

December 21, 2007

The objectives of this activity are to: o Identify and document functional requirements related to potential systems, o Identify and document data requirements related to potential systems, o Identify and document technical requirements related to potential systems, o Identify and document integration requirements related to potential systems, o Identify and document communications requirements...

Img
compliances , networking , policies , security

Cellular / Mobile Standards History

November 17, 2007

Cellular / Mobile Standards History 0G MTS (1946 – US, Bell System) IMTS (1969 – US, Bell System) OLT (1966 – Norway) AMTS (Japan) ARP (1971 – Finland) MTD (1971 – Sweden) 1G 1G cell phone technology encompassed analog standards introduced in the 1980s and continued until replaced by...

Img
compliances , security

Database Mirroring Best Practices

November 2, 2007

Free document download (Raid overview) Database Mirroring Best Practices

Img
compliances , itil , security

ITIL Request Management Benefits

November 2, 2007

Goals: Increase productivity Enforce business rules Provide automation where possible Provide audit trail De-provisioning and re-provisioning appropriate assets Change Order Management Workflow Tasks Individual assignment and notification Track cost & time Often used by: IT HR Facilities Request / Incident / Problem Management Overview / benefits: Request for Change...

Img