Security News

Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. This New Employee Checklist and Default Access Policy from TechRepublic Premium enables the IT and HR departments to effectively partner and ensure new hires receive a standard set of equipment and features.

It's time for all organizations to examine and potentially recalibrate their software update policies. This article delves into the why and how of this necessary introspection, aiming to provide a comprehensive guide to developing a robust software update policy fit for the modern workplace.

Computers, laptops, servers and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems...

The policy's purpose is to define for employees, IT department staff and users the process to be followed when experiencing a suspected IT-security incident. Receiving strange unprompted messages, error windows or pop-up alerts.

Electronic data is likely to be more prevalent in today's organizations than physical printed data. The purpose of this policy from TechRepublic Premium is to provide guidelines for the appropriate disposal of information and the destruction of electronic media.

The purpose of this policy from TechRepublic Premium is to provide guidelines for appropriate penetration testing and scanning of computer systems and networks. Penetration tests can be basic, checking for systems not protected by passwords, for instance.

A security policy is only as valuable as the knowledge and efforts of those who adhere to it, whether IT staff or regular users. Understanding the importance of computer and network security, and building accountability for these concepts, is critical to achieving organizational goals.

Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred.

SAFE BROWSING. Use a modern, supported and up-to-date browser. Browsers will proactively warn users before accessing websites with expired security certificates or that are known to host malware.

SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers.