|Do you have a Security Response Plan?
by David Shuster
Security Incident Response Policy and Procedures should be in place for institutions to have a security plan to protect the confidentiality and integrity of personal information.
Clients are also responsible for taking steps to ensure that their affiliates and service providers safeguard customer information in their care. The plan should include;
Designate one or more employees to coordinate the safeguards
Identify and assess the risks to customer information in each relevant area of the company's operation, and
Evaluate the effectiveness of the current safeguards for controlling these risks
Design and implement a safeguards program, and regularly monitor and test it
Select appropriate service providers and contract with them to implement safeguards
Evaluate and adjust the program in light of relevant circumstances, including changes in the firm's business arrangements or operations, or the results of testing and monitoring of safeguards.
Basic Network Connectivity Troubleshooting Steps
by Sean Holshu
Here are some simple common troubleshooting things that you should know how to do when THAT phone call comes in. "Network is down"
#1 Relax - The first and foremost concept for troubleshooting is not to panic. It might sound like the simplest thing, but a sense of urgency can lead to mistakes and missing a simple fix.
#2 Start from the beginning- A common mistake is that you assume that the network is really down. If you can, go and visit the caller and check out the problem first hand. If you cannot locate yourself with the caller, then get a good understanding of the operating environment. Is the caller; mobile, at home, in the office, wireless, or wired etc. What task is the caller trying to perform?
#3 Verify the physical layer - If your caller is wired - check the cable. The cable should be free of splits, repairs or loose connections at the wall or at the computer. You should make sure that the user has used that cable and wall plug successfully in the past. Lastly, check the port on the computer to see if there is a green light. The green light indicated that there is a physical path from the network card on the computer and the networking hardware in the closet.
#4 Interview the User - Determine how the user came to arrive at the work location. Did he move from a wired to a wireless environment or vice versa? If you cannot identify atypical working conditions, begin determining when the user was last able to connect to the network.
#5 Contact your network administrator - When you contact your network administrator, give them a walk through of all that you know and what you have tried. This will speed the resolution to the issue.
I hope that these simple steps will help guide you to a quick and effective resolution with one of these steps. Also, remember to document the issue and resolution.
See us at the following events:
OSBA Capital Conference on Nov 8th and 9th
CSC will have a both are the Ohio School Board Capital Conference. Stop by to learn about how we can improve the technology in your school district. Click here for more info.
The Ohio School Improvement Institute - A new Decade of Possibilities
CSC is a proud sponsor of the and invite you to join us and other thought leaders at the Renaissance Hotel on Nov. 18th and 19th. For more information click here.
Did you know...
Federal Laws that Govern Data Security
Compliance for the Savvy Business
Federal Trade Commission Act
Fair Credit Reporting Act
FTC Disposal Rule
Are your policies up to date? Find out more here.