
Walkthrough of the most misused security points in a standard IT system
- Password Policy
- Update and patching of windows
- User acces i AD
- Admin offices for the system
- Security in Firewall
- Security in wireless network
- Security on cable network
- Walkthrough of backup

Besides the points from fase 1, we dig deeper into the companys IT systems
- Walkthrough of the companies 3 part software systems.
- Update and patching of these 3 part systems
- Tjek up on the security on eksternaliteterne service systems like DNS, cloud mail and other cloud systems

All the points from fase 1 and 2, but we dig deeper by analyzing traffic over a given timeperiode
- Instalation of security hardware to monitor the companies traffic patterns and what is a possible thread .
- Further in depth walkthrough of the companys IT-behavior, on the companys machines