Security News

The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing. P2P applications should only be used to send specific files for a limited duration of time.

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company.

IT professionals, such as system and network administrators, help desk staff, management personnel and sometimes external vendor representatives, are routinely provided full access to company servers, network devices and data so that they can effectively perform their jobs. This policy from TechRepublic Premium provides guidelines for the company and its IT staff to ensure the appropriate administration of and access to critical systems and confidential data.

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on...

Microsoft now provides administrators with a new Windows 11 policy that controls how monthly non-security preview updates are installed on enterprise devices.This newly introduced policy provides IT admins with the tools required to manage the deployment of new Windows 11 features and fixes before the general release scheduled each month during Patch Tuesday.

This policy provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications resources, services and activities.

In many ways, data has become the primary currency of modern organizations. PROCEDURES. All unauthorized access to facilities, systems and devices is considered a major breach of security, whether the data involved is classified as restricted or not.

Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife and even providing internet access are just a few of the functions drones can offer.

This policy from TechRepublic Premium helps ensure an organization's storage media are properly cleansed and sanitized prior to disposal, recycling or donation. Resource Details Download for $19 or Access all downloads for $299/yr*.

The EU General Data Protection Regulation is a comprehensive set of rules designed to keep the personal data of all EU citizens collected by any organization, enterprise or business safe from...