ipl-logo

Nt1310 Unit 3 Pest Analysis

131 Words1 Pages
1. Policies governing the network insecurities which include Email and communications policy, Remote Access Policy, BYOD Policy and Encryption policy 2. User accounts management through training and assigning of user roles depending on their access levels to information in the organization. 3. Setting up workstations and assigning every user a workstation. The workstation should be configured to the main server. 4. Deploy network equipment such as routers and firewalls. Ensure they are up and running and up to date. They should be only configured by authorized users only like network administrators. 5. Information backup should be in place. It should be updating information automatically and another important point is to consider offset backup.

More about Nt1310 Unit 3 Pest Analysis

Open Document