Business HelpDesk
WE help our clients to troubleshoot issues quickly, efficiently and correctly using industry standard support solutions to access our clients’ workstation, minimizing disruption to their productivity.
We support employee hardware, software, operating systems, and printer and peripheral set-up support and troubleshooting.
We provide monitoring, automation, anti-virus, anti-malware, patch management and cloud services.
Lead and foster an environment where anyone can engage in any repeatable task in support of the client and produce the exact output desired, based on process documentation.
Available Policies:
• Baseline Controls
• Managed DNS (MDNS) Standards
• Patch Management Standard
• Mail and Communications Policy
• Mail Protection Standards
• Password Standards
• Asset Management Plan
• EndPoint Management Plan
• EndPoint Lockdown Procedure v12
• Remote Access Policy (RAP)
• Personal Device Policy
• Security and Awareness Training
• Acceptable Use & Responsibility Policy
• Workplace Monitoring Policy
• Clean Desk Policy
• Right to Disconnect Policy
• Information Protect & Governance
• Identity Access Management (IAM)
• Data Destruction Policy
• Cloud Service Guidelines
• Change Management PROCEDURE
• BCP/DR Plan
• Designated Officers, Auditors and Administration
• Plan Activation
• Disaster Recovery Plan (DRP)
• Data Retention Plan
• HR IT/IS Integration
• Incident Response Plan (IRP)
• Threat Response team
• Incident Response Process
• Cyber Security Breach
• Cyber Security Response
• Incident Review
• Incident Report Requirements
• Threat Classification Index
• Perimeter Defense Plan
• Router & Firewall Standards
• Zero Trust
• Penetration Testing
• Network Montioring
• Wifi & Untrusted Networks
• IOT Framework
• Vulnerability Scanning
• Tenant Standards
• Microsoft SharePoint & OneDrive
• Microsoft Teams
• Reporting and Review Plan (RAR)
• Scheduled Reminders
• Security Score Reporting
• Security and Compliance URLs
• Website Privacy Policy
• Cyber Security Breach
• Cyber Security Response
• Incident Review
• Incident Report Requirements
• Threat Classification Index
• Perimeter Defense Plan
• Router & Firewall Standards
• Zero Trust
• Penetration Testing
• Network Montioring
• Wifi & Untrusted Networks
• IOT Framework
• Vulnerability Scanning
• Tenant Standards
• Microsoft SharePoint & OneDrive
• Microsoft Teams
• Reporting and Review Plan (RAR)
• Scheduled Reminders
• Security Score Reporting
• Security and Compliance URLs
• Website Privacy Policy
Contact WaterlooIT!
Together we’ll create a plan to ensure that your business remains viable through critical times.