Eythan Goh

  • Total activity 216
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 1
  • Subscriptions 109

Activity overview

Latest activity by Eythan Goh
  • Eythan Goh created an article,

    Google

    Google

  • Eythan Goh created an article,

    Physical Security

    Do: Accompany visitors. In the office, if you see someone that is not familiar and not accompanied by a Zendesk employee, feel free to ask them if they have been helped. Notify facilities imme...

  • Eythan Goh created an article,

    Information Security Policy

    All Employees, Contractors, and Third Party Worker who have access to our information should be aware of the Information Security Policy, which can be found here.

  • Eythan Goh created an article,

    First Aid Training Video

  • Eythan Goh created an article,

    Estacionamiento

    Todos los empleados tienen derecho a un lugar de estacionamiento dentro de nuestras oficinas.  La tarjeta de acceso se le entregará a cada uno de los empleados junto con su kit de bienvenida.  En c...

  • Eythan Goh created an article,

    IT Policy Video

  • Eythan Goh created an article,

    Glossary of Terms

    Technology Assets - All Company-owned wired or wireless networks and virtualized and non-virtualized information systems, including laptops, desktops, servers, tablets, mobile devices, applications...

  • Eythan Goh created an article,

    Change Management

    What you need to know Access to GitHub is limited, by roles, to appropriate Zendesk Personnel. GitHub functions as a repository for all source code changes, and includes documentation for each c...

  • Eythan Goh created an article,

    Access Control

    What you need to know Network-based controls are in place that require employees to originate from either a Company office or via the approved VPN gateway to gain access to the SkyCab Production Ne...

  • Eythan Goh created an article,

    Security Monitoring

    What you need to know SkyCab utilizes various monitoring tools to log and evaluate potential security events. Systems record specific events which are recorded locally to log files, and then sent t...