Chad Perrin

Displaying 1-6 of 6 results

  • Downloads // Apr 2011

    10 things you should do to securely dispose of computers

    The need for good security practices doesn't go away just because a system has outlived its usefulness. These tips will help ensure that decommissioned equipment doesn't pose a threat.This download is also available as an entry in our 10 Things blog.

    Provided By Chad Perrin

  • Downloads // Apr 2010

    10 security books you might want on your reading list

    An ever-evolving list of books 'to be read' is a constant temptation. Chad Perrin hopes his security book wish list will tempt you, too.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2009

    10 tips for secure computer disposal

    If you're in charge of IT resources at an organization with more than a handful of users, you might need this advice for secure equipment disposal.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Feb 2009

    10 ways to protect your company from employee transition risks

    Employment transition is an often overlooked danger to company security. Make sure you have policies and procedures in place that will protect your business from security compromises when someone leaves your company.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Dec 2008

    10 essential e-mail security measures

    E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don't shoot yourself in the foot. These best practices will help you avoid any mistakes. This download is also available...

    Provided By Chad Perrin

  • Downloads // Jun 2008

    10 things you should do to ensure basic Web site security

    Using a security procedures checklist is your first step toward securing a resource -- a means of aiding your memory before you apply your critical thinking skills and imagination to the task of improving security for each item. Chad Perrin shares his list of far-too-common security failures on Web sites...

    Provided By Chad Perrin

  • Downloads // Feb 2009

    10 ways to protect your company from employee transition risks

    Employment transition is an often overlooked danger to company security. Make sure you have policies and procedures in place that will protect your business from security compromises when someone leaves your company.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2009

    10 tips for secure computer disposal

    If you're in charge of IT resources at an organization with more than a handful of users, you might need this advice for secure equipment disposal.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Dec 2008

    10 essential e-mail security measures

    E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don't shoot yourself in the foot. These best practices will help you avoid any mistakes. This download is also available...

    Provided By Chad Perrin

  • Downloads // Jun 2008

    10 things you should do to ensure basic Web site security

    Using a security procedures checklist is your first step toward securing a resource -- a means of aiding your memory before you apply your critical thinking skills and imagination to the task of improving security for each item. Chad Perrin shares his list of far-too-common security failures on Web sites...

    Provided By Chad Perrin

  • Downloads // Apr 2010

    10 security books you might want on your reading list

    An ever-evolving list of books 'to be read' is a constant temptation. Chad Perrin hopes his security book wish list will tempt you, too.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2011

    10 things you should do to securely dispose of computers

    The need for good security practices doesn't go away just because a system has outlived its usefulness. These tips will help ensure that decommissioned equipment doesn't pose a threat.This download is also available as an entry in our 10 Things blog.

    Provided By Chad Perrin