Security News

Electronic Communication Policy
2023-08-22 16:00

This policy provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications resources, services and activities.

Data Classification Policy
2023-08-15 16:00

In many ways, data has become the primary currency of modern organizations. PROCEDURES. All unauthorized access to facilities, systems and devices is considered a major breach of security, whether the data involved is classified as restricted or not.

Drone Usage Policy
2023-08-14 16:00

Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife and even providing internet access are just a few of the functions drones can offer.

Media Disposal Policy
2023-08-13 16:00

This policy from TechRepublic Premium helps ensure an organization's storage media are properly cleansed and sanitized prior to disposal, recycling or donation. Resource Details Download for $19 or Access all downloads for $299/yr*.

EU General Data Protection Regulation Policy
2023-08-08 16:00

The EU General Data Protection Regulation is a comprehensive set of rules designed to keep the personal data of all EU citizens collected by any organization, enterprise or business safe from...

Encryption Policy
2023-08-07 16:00

Encryption is vital for securing data, whether in transit or stored on devices. ALGORITHM REQUIREMENTS. Ciphers that are proven, standard, highly tested and free of patent encumbrances must be used as the basis for encrypting devices and communications.

Data Encryption Policy
2023-07-30 16:00

The Data Encryption Policy's purpose is to define for employees, computer users and IT department staff the encryption requirements to be used on all computer, device, desktop, laptop, server, network storage and storage area network disks, and drives that access or store organization information to prevent unauthorized access to organization communications, email, records, files, databases, application data and other material. This policy from TechRepublic Premium can be customized as needed to fit the needs of your organization.

Auditing and Logging Policy
2023-07-23 16:00

Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities. These activities include network traffic, internet access, creating or deleting users, adding users to groups, changing file permissions, transferring files, opening the case, powering off, deleting system logs, and anything else a user, administrator or the system itself might do.

Intrusion Detection Policy
2023-07-20 16:00

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage.

Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor
2023-07-11 19:09

Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level. Cisco Talos discovered a new Microsoft Windows policy loophole that allows a threat actor to sign malicious kernel-mode drivers executed by the operating system.