![]() We've chosen to use LanSweeper to track assets. At least twice a week it also locks up and our end users can't access the help desk portal to submit tickets. We found this out by using WSUS to determine how many computers we had and Spiceworks was off by 30 assets of the 180. We recently have been experiencing issues where Spiceworks would attempt to scan 180 assets and it would fail to complete the scan without errors. I understand that these keys are in the registry but other similar scanners would only produce keys for whats actually installed on the workstation by cross-referencing installed applications and registry keys. It ended up showing us that several computers had 3 iterations of office installed. We also went through a license key audit and thought we could rely on Spiceworks to produce accurate results. We've also had issues where it would scan a computer that had 2 monitors but would only show one. I ended up writing a batch file that would obtain them remotely and that was accurate. It came back telling us a generic description. We attempted to use Spiceworks to produce the make and model of the current monitor the end users were using. At one point this year we were upgrading our end users to dual monitors. I agree with Alpharius Omegon, try to bring as many standalone policies into one employee policy to rule them all :) Instead of having employees signing paper after paper after paper, we consolidated many individual policies into an overarching Technology and Data Use Policy and an Incident Response plan.Īnd remember to consider having policies for contractors, vendors, volunteers, interns.Cons: The inventory system is lacking when it comes to producing accurate information. ![]() Here is a quick mind dump of some potential policies to consider incorporating:Įmployee Policies - such as Acceptable Use, Incident Response Plans, Remote Access, Email/Communication, Password, Clean Desk, Internet Usage, Removable Media, Workstation (HIPAA), etc.Ĭompany or IT Policies - Disaster Recovery Plan, Business Continuity Plan, Access Control, Change Management, Technology Disposal, Information Security/WISP, Mobile Device, Wireless, etc.Īre you in a specific industry? Any compliance requirements? And don't let this give you imposter syndrome, even lawyers don't want to get involved with writing policies!!!!!!!!! ![]() It seems like you're being asked a very wide question. We get a lot of policy questions, especially with cybersecurity insurance requirements hardening! ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2023
Categories |