I T New Years Resolution

407 views
358 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
407
On SlideShare
0
From Embeds
0
Number of Embeds
30
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Hello good morning and welcome my name is David Watson and I am the IT Partner here at Milsted Langdon. Thank you for coming this morning to what hopefully should be an enjoyable and informative session. First things first Emergency Exit, Toilets, Mobile phones.
  • I T New Years Resolution

    1. 1. IT New Year Resolutions David Watson IT Partner
    2. 2. Agenda <ul><li>9.00am Overview of Redcliff Solutions </li></ul><ul><li>9.10am IT Security </li></ul><ul><ul><ul><ul><ul><li>PC / Laptops - Tim Long </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Local Area Networks - Chris Stilton </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Wide Area Networks - Tim Long </li></ul></ul></ul></ul></ul><ul><li>9.45am Break </li></ul><ul><li>10.00am Disaster Recovery Planning </li></ul><ul><ul><ul><ul><ul><li>Historical Perspective - David Watson </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Recommended Solutions - Chris Stilton </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Legal Implications of DR - Tim Long </li></ul></ul></ul></ul></ul><ul><li>11.00am Bio Metrics Workshop </li></ul>
    3. 3. Redcliff Group
    4. 4. Securing your PC <ul><li>What are the threats? </li></ul><ul><li>Risk Mitigation </li></ul><ul><ul><li>Firewall </li></ul></ul><ul><ul><li>Anti Virus </li></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><ul><li>Backup </li></ul></ul>
    5. 6. Virus Growth
    6. 7. Solutions /Brands
    7. 8. Circle of Trust
    8. 9. Security on the Network <ul><li>Levels of Complexity </li></ul><ul><ul><li>Peer to peer </li></ul></ul><ul><ul><li>Centralised Server </li></ul></ul><ul><ul><li>Modern Typical Environment – Multi Office </li></ul></ul><ul><li>Areas of Weakness </li></ul><ul><ul><ul><li>Internet Connection </li></ul></ul></ul><ul><ul><ul><li>Remote Workers </li></ul></ul></ul><ul><ul><ul><li>Concentration of Data </li></ul></ul></ul>
    9. 10. Hardware Firewall
    10. 11. Remote Workers
    11. 12. Security on the Network <ul><li>Levels of Complexity </li></ul><ul><ul><li>Peer to peer </li></ul></ul><ul><ul><li>Centralised Server </li></ul></ul><ul><ul><li>Modern Typical Environment – Multi Office </li></ul></ul><ul><li>Areas of Weakness </li></ul><ul><ul><ul><li>Internet Connection </li></ul></ul></ul><ul><ul><ul><li>Remote Workers </li></ul></ul></ul><ul><ul><ul><li>Concentration of Data </li></ul></ul></ul>
    12. 13. Disaster Recovery Planning <ul><li>Historical Perspective </li></ul><ul><ul><li>Diskette – Tape – Disk – Online </li></ul></ul><ul><li>Assessing Risk </li></ul><ul><ul><li>Business Processes Analysis </li></ul></ul><ul><li>Measuring Financial Impacts </li></ul><ul><ul><li>BIA – Business Impact Assessment </li></ul></ul><ul><ul><li>Drawing conclusions </li></ul></ul><ul><ul><li>Starting your Plan </li></ul></ul>
    13. 14. Legal implications of DR <ul><li>Contractual Failures </li></ul><ul><li>Directors Duty of Care </li></ul><ul><li>Data Protection </li></ul>
    14. 15. Questions <ul><li>Bio Metrics Workshop </li></ul>

    ×