Visitor IT Security Procedure

1.        Purpose

Visitors to the Company carrying IT equipment pose a serious threat to the security of our IT systems. Commonly, the equipment in question are laptops, and we will use the term laptops instead. Without proper control, a visitor with a laptop can connect to the network and infect the system with viruses or malicious programs (e.g. Trojans), either on purpose or unintentionally. The Visitor IT Security Procedure is designed with the purpose of preventing and covering such cases, should they occur. Read More

Vulnerability Scanning and Correction Procedure

1.        Purpose

The development of Internet technology has originated a surge of new application solutions to improve business practices in corporations. This technology has allowed companies to be more competitive on a global scale and changed the way people do business.However, as businesses worldwide place increasing reliance on interconnected systems and electronic data, the risks of fraud, inappropriate disclosure of sensitive data, and disruption of critical operations and services increase. The same factors that benefit business operations also make it possible for individuals and organizations to inexpensively interfere with or eavesdrop on these operations from remote locations for purposes of fraud or sabotage, or other mischievous or malicious purposes.

Evidently, security and privacy protection are key issues for companies nowadays. Maintaining security and privacy requires corporate planning, training, implementing controls properly, monitoring the effectiveness of controls and taking necessary corrective action. Read More

Disaster Recovery Plan for MFG/PRO ERP System

1.        Definition

In this document context, ‘MFGPRO ERP System Disaster’ refers to the situation where the total system is unavailable to the users either due to hardware, network, or software problems and recovery is estimated to take more than 48 hours

‘MFGPRO Disaster Recovery’ is to offer a temporary measure/workaround solution to the organization to enable partial delivery of the processing service. Read More