We are proficient with the installation and management of enterprise class networks and are currently studying for
GIAC certification for Security Professionals from the SANS Institute (System Administration, Networking and Security).
Below is an example of some of the things we look after for you:
Hackers - These are people that try to invade your computers. This is why we have such things as Firewalls and
passwords. No one likes to be handcuffed by technology, but having unique security measures is becoming more and more
Viruses - These are programs that get into your computer and do any or all of the following:
1. Spread to other computers.
2. Cause your computer to slow down.
3. Delete information.
You can get viruses from any source that inputs information into your computer such as:
1. Internet Web sites
3. from a floppy disk that you put in your computer
Once in your system, viruses can spread through a LAN by themselves or email. This is why we must have Anti-Virus
software on ALL workstations connected to a network.
Spam email - This is the name for unwanted email. It is important to mention that not all unwanted email is
pornographic. Some of the categories they could fit are:
2. Marketing schemes, ie: get rich quick
3. Legitimate Marketing - These are from reputable companies. For example, you might get email from companies in your
profession trying to sell products or services. And even though you may not want them, they probably got your email
address from a reputable source.
Spyware - These are usually "Cookies" that get downloaded from Web Sites and retrieve your email ids so that they can
be included in Spam Email Lists.
Data Backup/Disaster Recovery:
There are many different ways to back up computers. Remote-Secure Backup is the best. It has unlimited capacity, can
be fully automated and is immediately off-site for Disaster Recovery. Other methods include Tape, CD Writers,
Zip Disks and Floppy disks.
We feel it is important to point out that while data backups are critical; they are only the beginning of Disaster
Recovery. We are members of D.R.I.E (Disaster Recovery Information Exchange) and we can help you form a comprehensive