Auditing

Who Has Your Data? The Right Security for Your Situation

Your IT infrastructure can be your strongest asset— or your worst vulnerability—depending on where you put it in your strategic hierarchy. If you’re subject to HIPAA, Sarbanes-Oxley, or other regulations, you need to comply with strict mandates for data security, discovery, and reporting. A quality IT infrastructure makes it easy to stay within the boundaries of the law. A lesser infrastructure makes it a constant (and potentially costly) hassle. 


Network Assessment

SkyPort-IT’s Network Assessment gives you a clear picture of your network’s infrastructure. If your organization is looking to refine, upgrade or expand its network, the first step is to understand the capabilities and shortcomings of the existing network. This would cover the actual physical network, server, and workstation equipment already in place. A network assessment identifies current equipment that needs to be upgraded and exposes performance issues impacting the organizations productivity or reliability. If network issues are uncovered, remediation plans are developed to fix the problem and optimize your network’s performance.

Security Assessment

SkyPort-IT’s Security Assessment is a methodical evaluation of the security of a company’s information systems by measuring how well it conforms to a set of established criteria. A thorough assessment typically audits the security of the system’s physical configuration and environment, software, information handling processes, and user practices. Security audits are used to determine regulatory compliance, in the wake of legislation (such as HIPAA, the Sarbanes-Oxley Act, and the California Security Breach Information Act) that specifies how organizations must deal with information.

HIPAA/HITECH Audit

More than 700,000 hospitals, emergency medical clinics, dental offices, nursing homes and other health-related entities are required by law to have a specialized IT risk assessment performed to satisfy the requirements of HIPAA – The Health Insurance Portability and Accountability Act. Are you in compliance? If not SkyPort-IT can provide the all the necessary auditing and risk analysis reporting to meet the challenge head on. Our purpose-built IT tool combines automated collection of network data with information collected through observations, photographs and surveys. It’s also the only solution that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates the official documents that comprise a comprehensive HIPAA IT assessment, including: HIPAA Policy and Procedures, HIPAA Risk Analysis, HIPAA Management Plan, Evidence of HIPAA Compliance and all of the associated supporting documentation.

Exchange Assessment

For many companies Microsoft Exchange is the most important system running in their environment. Ensuring the confidentiality of corporate e-mail data and continuous availability of e-mail service are two of the most critical tasks. Loosing private e-mail data to unauthorized strangers or downtime of Exchange servers may cost an organization more than a damaged reputation. The ability to audit exchange mailbox access, mailbox settings and changes to configurations of Exchange servers is critical to ensure security, compliance and reliable e-mail operation. This information will also make the process of upgrading or expanding your Microsoft Exchange a much easier task.

SQL Server Assessment

Microsoft SQL Server is a critical IT component that many organizations rely on to keep their business running efficiently. SQL Server is a complex system that involves many different types of objects and settings – data, server configurations, security settings, databases and tables all which can change on a daily basis. This can make it difficult to keep track of changes and enforce fine-grained delegation rules for environments managed by multiple DBAs and operators. The task of sustaining efficient SQL Server security audit becomes a high priority task. This audit gives you the tools you need to properly manage any application running on SQL Server – including SharePoint!


Don’t give your password a ‘pass’.

A simple best practice for data protection is to choose complex passwords that are difficult to break. This is such a simple way to protect your data, but so many people ignore basic password best practices. Try to create passwords that will be difficult to guess. Don’t use the same password for all of your accounts and protected information. Try creating a password that includes capital letters, numbers and symbols for the highest password security.