We will help strengthen the organization's IT security, determine the readiness against security breaches and safeguard the business' information from computer attacks. With the growing threat of computer hacking, businesses/organizations need to protect themselves.
Computer security auditors perform their work through a personal interview, vulnerability scans, examination of operating system settings, analyses of network shares, and historical data. They are concerned primarily with how security policies, the foundation of any effective organizational security strategy, is actually used. The computer security audit is not a one-time task, but a continual effort to improve data protection. The audit measures the organization's security policy and provides an analysis of the effectiveness of that policy within the context of the organization's structure, objectives, and activities.
Jenny Jo is president of MJJT Consultants, Ltd. Ms. Jo also is a Certified Information Security Manager (CISM) which certifies her to audit information systems, as well as design, build and manage enterprise information security programs. Her operational and management experience, multicultural background and broad technical expertise give her a sharp eye for how bloated businesses can retool to become sleeker and more strategically focused. As an entrepreneur who quickly built her own successful computer consulting business, she helps other business owners maximize revenues and minimize costs by adopting a technology.