Security Awareness and Training Policy

A security policy is only as valuable as the knowledge and efforts of those who adhere to it, whether IT staff or regular users. Understanding the importance of computer and network security, and building accountability for these concepts, is critical …

February 13, 2023
Read More >>

Internet and Email Usage Policy

This policy from TechRepublic Premium sets forth guidelines for the use of the internet, as well as internet-powered communication services, including email, proprietary group messaging services (e.g., Slack) and social networking services in business …

February 9, 2023
Read More >>

Auditing and Logging Policy

Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities. These activities include network traffic, internet access, creating or deleting users, adding users to groups, changing…

February 2, 2023
Read More >>

Access Management Policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs…

February 1, 2023
Read More >>

IT Staff Systems and Data Access Policy

IT professionals, such as system and network administrators, help desk staff, management personnel and sometimes external vendor representatives, are routinely provided full access to company servers, network devices and data so that they can effective…

January 31, 2023
Read More >>

Checklist: Securing Windows 10 Systems

Every operating system should be appropriately secured, especially end-user workstations, which often contain or permit access to company data and upon which most employee job duties are based. Here is a checklist from TechRepublic Premium for getting …

January 22, 2023
Read More >>

Malware Response Checklist

Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an…

January 22, 2023
Read More >>

IT email templates: Security alerts

All company communication needs may vary but certain standard template messages can come in handy for IT staff to keep employees up to date on “need to know” informational bulletins. These bulletins may be one-off or regularly scheduled communications …

January 18, 2023
Read More >>

Security risk assessment checklist

Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are under attack. Worse, neither an organization nor its managers need …

January 9, 2023
Read More >>