IT Security Policy

  • Introduction

    Why Does Your Business Need An IT Security Policy?

    In most computer operating systems, there is the ability to login to the computer so that it retrieves the user’s configuration, settings and data. This is called a profile, however in most cases, out of the box, a profile is insecure and grants the user far too much in terms of privilege and the ability to make changes, install software, extract data which can have catastrophic consequences for the businesses computer security.

  • The solution

    IT Security Policy Protects Your IT System and Maintains Consistency In Your Business

    An IT security policy identifies the rules and procedures for all individuals accessing and using the companies  IT systems.

    • Using profiles that are configured by security policies, policies that remove the ability of the user to do certain things, policies that change the behaviour of the computer or enable features such as encryption and policies that configure the computer for the work place such as automatically installing software or setting up peripherals such as printers automatically.
    • Deploying policies to secure each user within their profile and can help an organisation prevent costly security incidents and even if there is a breach or incident, the regulator will be far more lenient if there have been changes to secure the user profiles.
    • Policies need to be configured correctly otherwise they can have consequences we could compare to locking the keys inside the safe, which is a situation that any business does not want to find themselves in.
  • Our approach

    We Can Design and Implement an IT Security Policy That's Secure, Balanced and Functional.

    We can help understand and shape a businesses’ security and regulatory requirements. Our experienced business IT support engineers will help design and implement an IT security policy that will provide the right level of role based access balanced with the right security requirements. This will provide a secure, functional and controlled computer environment.

    We've helped numerous companies with their  IT security policy in Wiltshire, Hampshire, and Dorset. It’s in our interest to help secure your business too.

Featured Case Study

  • Sector / Charity

    Local Charity The Trussell Trust, Adopts Full Cloud Services in Salisbury


    Our Client 

    The Trussell Trust is a leading anti-poverty charity which supports a nationwide network of food banks. Together they provide emergency food and support to people locked in poverty and campaign for change to create a hunger free future where food banks are no longer needed. There are more than 1,200 food bank centres in the Trussell Trust’s network, roughly two thirds of all the food banks in the UK. The Trussell Trust supports these food banks to provide nutritionally balanced emergency food parcels to people in crisis who have been referred to them by advice agencies, GPs, schools, and others. Food banks also offer people support and guidance to help them resolve the crises they are facing.

    The Problem

    Inconsistent software across workstations and laptops, outdated servers and a need for a more flexible working environment

    The Trussell Trust was running a fully supported version of Windows server in a hypervisor environment with VM’s running Active Directory and Exchange 2010 and file shares.

    Workstations and laptops were running a mixture of Windows 7 and Windows 10 with Office 2010. A 2008 R2 terminal server was being used for remote access and was due to go out of support with Microsoft.

    The organisation wanted to get all IT systems, workstations, and laptops running supported software and the latest Microsoft Office applications.

    They also wanted to get away from the old version of Microsoft Exchange and move their files to the cloud and migrate into SharePoint to become less reliant on on-premise servers and remove the 2008 R2 Terminal server.

    The Solution

    Utilising the full suite of Microsoft Office tools to ensure consistency and efficiency 

    • A new Microsoft 365 tenant was created using the not-for-profit portal. AD Sync tool was installed into their on-prem environment and their Active directory was synced up with M365 in full hybrid mode.
    • Once all machines were upgraded, the email hosting on Exchange 2010 was migrated using the cutover migration process to cloud-based Exchange online. This was done with no email downtime for the users.
    • Once the mail was all cut over, the Exchange 2010 server was de-commissioned and switched off.
    • As soon as the Trussell Trust was able to proceed with the migration of files to SharePoint, this was done using the Microsoft SharePoint Migration Tool in a staged manner to avoid users not being able to access file shares.
    • Once each share was migrated it was made read-only on the on-premises systems for reference purposes only and to ensure continuity of data.
    • Microsoft Teams was also deployed during this stage to make every user experience much easier and more flexible.
    • The only exception to the SharePoint Migration was the Accounts files that were required to stay on-premises due to the accounting package in use. However, we were able to utilise the Direct Access system that was deployed earlier in the project to assist with remote access to this.

    The Outcome

    Fully supported and up-to-date in a Hybrid cloud environment

    The finished project meant that the organisation is now running its IT systems on fully supported software and operating systems, with the latest office applications in a Hybrid cloud environment. Staff are able to work much more efficiently moving forward with flexible working, with the majority of their systems fully cloud-based.

    Local Charity The Trussell Trust, Adopts Full Cloud Services in Salisbury

The Silver Cloud Business Can Help Transform How Your Business Operates and Collaborates.

Contact us today for more information or advice about IT Security Policy and how it can help benefit your business.