Hiring kit: Cybersecurity engineer

PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to…

March 27, 2023
Read More >>

Guidelines for building security policies

PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, …

March 23, 2023
Read More >>

Security response policy

PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and eff…

March 19, 2023
Read More >>

Electronic Communication Policy

This policy provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regar…

March 16, 2023
Read More >>

Electronic Data Disposal Policy

Electronic data is likely to be more prevalent in today’s organizations than physical printed data. Reams’ worth of documents can now be stored on computer hard drives, handheld devices and storage cards smaller than a fingernail. The bulk of many stra…

March 15, 2023
Read More >>

Employee termination policy

PURPOSE This policy provides termination guidelines, including the process of disabling former employee access, reclaiming company equipment and finalizing payroll/benefits details. It complements our Employee termination checklist, which should be fil…

March 13, 2023
Read More >>

Remote access policy

PURPOSE This policy outlines guidelines and processes for requesting, obtaining, using and terminating remote access to organization networks, systems and data. It applies to scenarios where employees connect remotely to in-house data centers as well a…

March 8, 2023
Read More >>

Risk management policy

SUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to en…

March 8, 2023
Read More >>

Security Incident Response Policy

The Security Incident Response Policy from TechRepublic Premium describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident. The policy’s purpose is to define for employees, IT d…

March 7, 2023
Read More >>

Transmission of sensitive data policy

Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. With this in mind, it …

February 23, 2023
Read More >>