I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.
what form or procedeure would you use for a final security Audit after the Avaya system is installed?
Is Siebel considered to be 508 Compliant?
Where can I get the information on IT auditing from this site? Thank You.
Which brand is EXCEED 13 , Hummingbird or Open Text
We have joined 2 Foundation servers to an existing domain as members in a Forest to a Server 2008 R2 Standard DC as the parent.Regularly on startup we get a message "Check for Licensing Compliance is Incomplete".I need to know how serious this error is? and are we going to experience problems if...
We currently use Hercules 4.5 to back up our SCCM for audits and remediations. When using Hercules audit, the customer receives a pop-up in the bottom right hand of their screen telling them that a compliance check is about to be performed on their system. The reaction of the customers are...
In our AS400 environment there are several individuals who has *SECADM and *ALLOBJ authority due to some reason, we are trying to investigate few incidents of system value settings which were changed but we don't who did it, any help or workaround which can lead us to the right path?
This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...
I have a quick question regarding SAS-70 Certification. If my company completes a SAS-70 audit, does that automatically make us certified or are there additional steps for certification? also when we get certified how long does that certification last before it will need to be renewed? any...
We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?
We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...
Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?
Hello If a customer don't wants to execute the SAS70 type 2 audit - is there any other compliance standards that you can choose from ? That is to get the same compliance documentation/status but not execute the SAS70 type 2 audit? Is there any light version of the SAS70 standards?
Are compliance concerns (such as PCI DSS) or more general data security concerns preventing you from moving data to the cloud? What would be required for you to reconsider your position?
Tell me how would it be possible for our organization to block password changes until our audit can find who has weak passwords? How can we find out current passwords using Windows 2003?
Possible new job, and one one of the first assingments will be to respond to an ISO 27001 audit. What could I expect, plan for?
Our company is trying to use best practices where possible to formulate a policy to cover the backup, storage, security, retrieval and retention of data from the PCs, home drives and Exchange mailboxes of employees that have terminated employment. Our company is publicly traded so the...
How was your latest IT compliance audit experience? Were there any particular pain points or worries you had?
How are iSeries audit logs protected (e.g., who can access them? Can they be changed?)