Security News

Perimeter Security Policy
2024-03-05 16:00

While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get through is an especially critical goal. Whether traffic is going from outside to inside or vice versa, having a strong, comprehensive and reliable perimeter security policy is integral to securing organizational data and the employees who use it to do their jobs and conduct company business.

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor
2024-02-19 04:39

The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with a new backdoor called BASICSTAR by creating a fake webinar...

Incident Response Policy
2024-02-14 16:00

This policy from TechRepublic Premium provides information on defining an incident, assigning an incident response team, documenting a plan and conducting a response. DOCUMENT AN INCIDENT RESPONSE PLAN. Draw up a plan for incident response and start by including a detailed list of system/application/device information.

Mobile Device Security Policy
2024-01-31 16:00

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. The same social engineering, phishing and application/operating system vulnerabilities which plague desktops and laptops are just as applicable to mobile devices.

Information Security Incident Reporting Policy
2024-01-23 16:00

This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.

Transmission of Sensitive Data Policy
2024-01-16 16:00

Data in transit means data is at risk if the proper precautions aren't followed. Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems.

Chinese Hackers Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure
2024-01-11 05:29

A pair of zero-day flaws identified in Ivanti Connect Secure (ICS) and Policy Secure have been chained by suspected China-linked nation-state actors to breach less than 10 customers. Cybersecurity...

Secure Browser Usage Policy
2024-01-07 16:00

A credit card or PayPal account is required for purchase. You will be billed the total shown above and you will receive a receipt via email once your payment is processed.

Incident Reporting and Response Procedures Policy
2023-12-07 16:00

TechRepublic Premium Quick Glossary: Cryptocurrency Cryptocurrency is a popular technological worldwide trend. Be forewarned, scams .... TechRepublic Premium What Is Artificial General Intelligence? Artificial general intelligence, or AGI, is a hypothetical form of AI designed to perform human-level cognitive functions, such as the capacity to self-teach.

New Employee Checklist and Default Access Policy
2023-12-03 16:00

Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. This New Employee Checklist and Default Access Policy from TechRepublic Premium enables the IT and HR departments to effectively partner and ensure new hires receive a standard set of equipment and features.