IT disaster recovery procedures

Regular testing, auditing, and rehearsal of your disaster recovery plans are essential to make sure that they do work, and can be progressively refined to cope with any changes in your work requirements. A common problem is where the backup portion of the plan is tested, but not the restoration process. Only during an actual

Read More

Internet Usage Guidelines

Organization may provides Internet access primarily to enable the conduct of IT and administrative activities in support of the organisation’s operations. The following guidelines for Internet usage should be noted: Access to Internet resources from on – campus organisation facilities must be made using Internet access arranged or approved by CEO/HOD When using the Internet

Read More

Physical Security

Physical controls are often viewed as involving only physical access to a facility. However, physical controls also include access to controlled areas within a facility, access to computers or other network devices, handling of laptops, and location and handling of printers. Unauthorized access to an unattended device can result in harmful or fraudulent use of

Read More