Auditing JTT’s Acceptable Use Policy CEO: Kerwing Hy, We Audit Tech (WAT) Auditing JTT’s Acceptable Use Policy
Access to Certain Sites Time Magazine’s 2013 List Facebook – 19.4% Twitter – 15.1% YouTube – 13.7% Pinterest – 11.2% Other social media – 10.9% LinkedIn – 9.7% Webmail (Gmail, Yahoo, etc.) – 9.3% Other sites – 4.6%
Password Security JTT’s Password Requirements What WAT can offer: #1 JTT’s Password Requirements Uppercase character(s) Lowercase character(s) A number Non-alphanumeric character(s) – i.e. $ , %, # Be a minimum of 10 character(s) JTT’s Password Requirements Uppercase character(s) Lowercase character(s) A number Non-alphanumeric character(s) – i.e. $ , %, # Be a minimum of 10 character(s) #2 Organizations should consider several factors when determining password expiration requirements, including the availability of secure storage for user passwords, the level of threats against the passwords, the frequency of authentication (daily versus annually), the strength of password storage, and the effectiveness or ineffectiveness of password expiration against cracking. Organizations should consider having different policies for password expiration for different types of systems, operating systems, and applications, to reflect their varying security needs and usability requirements. #3
Exporting JTT Data Monitor USB Usage Double Check all USB Ports Limit Access/Communication to 3rd Party Email Providers:
Unacceptable Usage: Hacking Illegal Distribution of Assets JTT: Data Loss Prevention (DLP)
We look forward to our potential partnership in creating a more secured and tested work environment! We can provide JTT with multiple auditing services