Security News
With the increasing reliance on complex and global supply chains, more companies are exposed to a wide range of risks, including theft, counterfeiting, cyberattacks, natural disasters, geopolitical conflicts, and regulatory changes. This customizable policy, written by Franklin Okeke for TechRepublic Premium, outlines the necessary measures and standards that will enhance the resilience of a supply chain.
This reality requires the adoption of a multi-factor authentication policy within organizations. Multi-factor authentication is a powerful tool for safeguarding sensitive data from unauthorized access.
These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations and especially vulnerable to risks, threats or attacks due to their public-facing nature, setting strict guidelines for how these devices should be configured for access is a key priority to ensure business continuity and data protection.
One way to do this is by aligning password policies with wider cybersecurity KPIs. Aligning your password policies with wider cybersecurity KPIs lets you prove the value of your investments.
Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain,...
Encryption is vital for securing data, whether in transit or stored on devices. This policy from TechRepublic Premium provides guidelines for adopting encryption technologies for organizational use that have undergone extensive technical review, are not encumbered by patents or copyright and have been proven to work reliably.
The EU General Data Protection Regulation is a comprehensive set of rules designed to keep the personal data of all EU citizens collected by any organization, enterprise or business safe from unauthorized access or use. The GDPR went into effect on May 25, 2018, and the provisions in the law greatly affected the manner in which every business transaction involving EU citizens is conducted.
The purpose of this customizable Social Engineering Awareness Policy, written by Maria Carrisa Sanchez for TechRepublic Premium, is to provide guidelines for preventing, recognizing and addressing social engineering attacks. Regular update of passwords: The company believes passwords serve as the fundamental line of security against unwanted access.
There has been a lot of toxicity in the comments section of this blog. Recently, we're having to delete more and more comments.
The concept of zero trust implies organizations must work under a constant worst-case scenario. The purpose of this customizable policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for organizations to strengthen their privacy and security postures by implementing an efficient zero trust model.