Security News

Electronic Data Disposal Policy
2023-10-30 16:00

Electronic data is likely to be more prevalent in today's organizations than physical printed data. The purpose of this policy from TechRepublic Premium is to provide guidelines for the appropriate disposal of information and the destruction of electronic media.

Penetration Testing and Scanning Policy
2023-10-22 16:00

The purpose of this policy from TechRepublic Premium is to provide guidelines for appropriate penetration testing and scanning of computer systems and networks. Penetration tests can be basic, checking for systems not protected by passwords, for instance.

Security Awareness and Training Policy
2023-10-02 16:00

A security policy is only as valuable as the knowledge and efforts of those who adhere to it, whether IT staff or regular users. Understanding the importance of computer and network security, and building accountability for these concepts, is critical to achieving organizational goals.

Identity Theft Protection Policy
2023-09-26 16:00

Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred.

Internet and Email Usage Policy
2023-09-24 16:00

SAFE BROWSING. Use a modern, supported and up-to-date browser. Browsers will proactively warn users before accessing websites with expired security certificates or that are known to host malware.

SSL Certificate Best Practices Policy
2023-09-20 16:00

SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers.

Secure Equipment Repair Policy and Confidentiality Agreement
2023-09-19 16:00

Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers and other IT equipment. If IT equipment must be returned to the manufacturer for repair, the data storage device(s) must be removed prior to the unit being shipped to the manufacturer.

P2P File Sharing Policy
2023-09-13 16:00

The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing. P2P applications should only be used to send specific files for a limited duration of time.

Access Management Policy
2023-09-13 16:00

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company.

IT Staff Systems and Data Access Policy
2023-09-11 16:00

IT professionals, such as system and network administrators, help desk staff, management personnel and sometimes external vendor representatives, are routinely provided full access to company servers, network devices and data so that they can effectively perform their jobs. This policy from TechRepublic Premium provides guidelines for the company and its IT staff to ensure the appropriate administration of and access to critical systems and confidential data.