Table of Contents
Technical
Relocation
Security
Web Design
Viruses
Webmaster Support
File Transfers
Crisis Support
System Upgrades

Evancom® ... "Facilitating Business & Technological Development" Since 1986
Evancom ... Internet Specialists Since 1995
Net Security
Given the speed and dynamics of Information Technology
("IT") development, there is no foolproof way to protect yourself from damage
brought on by computer hackers, crackers, viruses, trojan horses, worms, and spyware.
The only thing you can do is to minimize your risk with
appropriate security measures, system management and vigilance.
Security management entails a broad range of responsibilities and practices. It
is a never ending process which, if ignored or neglected, will most certainly
result in computer downtime which means high costs to business in terms repair
dollars, lost time, lost data, user frustration and ... lost business
opportunities.
Evancom® Corporate Support Services
- Net Security
Evancom provides independent computer
use/security reviews and audits to help expose IT security holes and weaknesses.
Fundamental security weaknesses are found in various areas of computer communications
ranging from company policy flaws, poor business practices, computer user habits, software weaknesses,
hardware weaknesses and more!
Whether your a one person company or a major
international corporation you still face vulnerability and
challenges - and losses when (not if) your computer
systems get attacked. Not recognizing and not dealing with computer
security will only mean a greater probability you will be effected by damaging
attacks earlier; and because you are not prepared, your losses will be greater!
Evancom®
consultation and support services help to expose and reduce your
risks of being affected by damaging external elements.
Just Some Services we Provide ...
- System Sweeps ... A broad review of computer, computer communication elements & usage to
recognize weaknesses in system security associated with software, hardware,
information transmission, and computer usage ... and reveal your level of risk
associated with network attacks.
- System Reviews & Audits
... Focused reviews of computer and communication equipment for
specific security concerns. These range from investigating suspicious computer
communication activity, and the reason for it - whether it be hardware, software,
internal usage or external sources.
- Computer Use Reviews & Audits
... There are incidences whereby an independent review of computer and
communication equipment used by known and unknown individuals is required. If
there is a specific security concern the reviews or audits are commonly limited
to the equipment used by one or a few individuals. If the incidences are a
widespread problem the usage reviews and audits are broadened to cover equipment
use within specific groups, departments or company wide.
- System Attack Investigations & Remediation
... Support to remediate any damage brought on by computer hackers, crackers,
viruses, trojan horses, worms, and spyware -analyzing infected systems with a report as to remediation and recovery options.
Once attacked there are absolutely no guarantees that the damage can be remediated so it is best to deal with the real and constant threat of attacks by
developing good corporate and management security policies and practices.
-
Corporate Policy Development & Implementation Support - Acceptable Use Policies
Evancom®
provides IT "policy and practices" development consultation support to help
management get a handle on IT security and manage security incidences
effectively. Effective security, management policies and training support help
undermine attacks on your computer communication
network. Regular policy reviews
are a wise practice.
For more information for those based in the Toronto-Niagara region please contact:
Evancom Telephone: 905-548-9118
Evancom® ... "Facilitating Business &
Technological Development" TM Since 1986
Evancom® ... Internet Specialists Since 1995