Presentation is loading. Please wait.

Presentation is loading. Please wait.

Auditing JTT’s Acceptable Use Policy

Similar presentations


Presentation on theme: "Auditing JTT’s Acceptable Use Policy"— Presentation transcript:

1 Auditing JTT’s Acceptable Use Policy
CEO: Kerwing Hy, We Audit Tech (WAT) Auditing JTT’s Acceptable Use Policy

2 Access to Certain Sites
Time Magazine’s 2013 List Facebook – 19.4% Twitter – 15.1% YouTube – 13.7% Pinterest – 11.2% Other social media – 10.9% LinkedIn – 9.7% Webmail (Gmail, Yahoo, etc.) – 9.3% Other sites – 4.6%

3 Password Security JTT’s Password Requirements
What WAT can offer: #1 JTT’s Password Requirements Uppercase character(s) Lowercase character(s) A number Non-alphanumeric character(s) – i.e. $ , %, # Be a minimum of 10 character(s) JTT’s Password Requirements Uppercase character(s) Lowercase character(s) A number Non-alphanumeric character(s) – i.e. $ , %, # Be a minimum of 10 character(s) #2 Organizations should consider several factors when determining password expiration requirements, including the availability of secure storage for user passwords, the level of threats against the passwords, the frequency of authentication (daily versus annually), the strength of password storage, and the effectiveness or ineffectiveness of password expiration against cracking. Organizations should consider having different policies for password expiration for different types of systems, operating systems, and applications, to reflect their varying security needs and usability requirements. #3

4 Exporting JTT Data Monitor USB Usage Double Check all USB Ports
Limit Access/Communication to 3rd Party Providers:

5 Unacceptable Usage: Hacking Illegal Distribution of Assets
JTT: Data Loss Prevention (DLP)

6 We look forward to our potential partnership in creating a more secured and tested work environment!
We can provide JTT with multiple auditing services


Download ppt "Auditing JTT’s Acceptable Use Policy"

Similar presentations


Ads by Google