Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Media disposal policy

    Tools & Templates // Sep 2016 // provided by Tech Pro Research

    This policy offers specific guidelines for ensuring that organization data is properly protected when you dispose of old storage media. From the policy: Summary The organization’s data and information possess tremendous value and must always be safeguarded. Specific processes exist to make sure that all organization storage media ...

    View This Now
  • Secure equipment repair policy and confidentiality agreement

    Tools & Templates // Sep 2016 // provided by Tech Pro Research

    This policy and agreement will help you define security requirements and monitor the status of equipment being repaired when your organization works with third parties to fix failed systems. From the policy: Summary Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers, and other ...

    View This Now
  • Quick glossary: Malware

    Tools & Templates // Aug 2016 // provided by Tech Pro Research

    Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of 22 terms will help you grasp the vocabulary that describes malware and the technology that ...

    View This Now
  • Securing Linux policy

    Tools & Templates // Jun 2016 // provided by Tech Pro Research

    Linux is a powerful and customizable operating system which has been the backbone of many businesses for decades. A derivative of the UNIX operating system, Linux is available as a free, open-source alternative to Windows and comes in many varieties, also known as distributions. Many companies rely on Linux to ...

    View This Now
  • Power checklist: Vetting employees for security sensitive operations

    Tools & Templates // May 2016 // provided by Tech Pro Research

    This checklist will help you find the safest route to governing appropriate access to sensitive data, apps, and processes. You can print the list or use it in electronic form.

    View This Now
  • Drone policy

    Tools & Templates // Jan 2016 // provided by Tech Pro Research

    Unmanned Aircraft Systems (UAS), more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications as of late. Delivering packages, recording terrain, reporting news, documenting wildlife and even providing internet access are just a few of the functions drones can offer. The list ...

    View This Now
  • Network Security Policy

    Tools & Templates // Dec 2015 // provided by Tech Pro Research

    Any given company’s network is made up of devices which transmit and store information. This can include internal and external systems either company-owned or leased/rented/subscribed to.In order to protect company data and reputation, it is essential to ensure the network is secured from unauthorized access, data loss, malware infestations and ...

    View This Now
  • Internet and Email usage policy

    Tools & Templates // Nov 2015 // provided by Tech Pro Research

    Engaging in internet access and electronic communications is often a core job duty for employees across all aspects of the business. It’s rare indeed to find any organization today in which employees don’t rely on web access and email services, whether for internal or external use. These services enable businesses ...

    View This Now
  • Power checklist: Managing and troubleshooting mobile devices

    Tools & Templates // Nov 2015 // provided by Tech Pro Research

    This checklist provides management guidelines and solutions to many of the issues routinely faced by mobile devices. You can print the list or use it in electronic form; the check boxes will help ensure that no steps are missed. An explanation of each step follows the list.

    View This Now
  • Employee termination policy

    Tools & Templates // Oct 2015 // provided by Tech Pro Research

    Whether due to resignation, layoff or firing, separating employees from the business is never a pleasant process — nor is it often easy. Because many staff members have access to confidential data or company assets, it is critical to utilize a series of detailed and comprehensive steps to complete employee ...

    View This Now