Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • IBM - Spectrum Protect Executive Demo

    Tools & Templates // May 2017 // provided by IBM

    Anyone can be a data protection expert by using the Operations Centre! Even with thousands of systems, virtual machines, and applications over multiple sites, you can quickly verify that your data is protected and identify any trouble spots. You can follow the task scenarios that are provided ...

    Free Trial
  • Network security policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: Summary Every company’s network is made up of devices that transmit and store ...

    View This Now
  • Information security incident reporting policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Make sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to a security incident and offers guidelines on the steps they should take. From the policy: Summary Confidential information must be kept secure to ...

    View This Now
  • Employee termination policy

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Whether due to resignation, layoff, or firing, separating employees from the business is never a pleasant process. Even so, it’s critical to follow a systematic procedure to ensure that all necessary measures are taken. This policy provides guidelines for disabling former employee access, reclaiming company equipment, and finalizing payroll/benefits details. ...

    View This Now
  • Lunch and learn: BYOD rules and responsibilities

    Tools & Templates // May 2017 // provided by Tech Pro Research

    The BYOD movement has benefited both companies and their employees by allowing the use of personal devices for job-related tasks. However, along with the benefits comes the need to establish guidelines for proper usage of these devices. This ready-made lunch and learn presentation explains the do’s and don’ts of using ...

    View This Now
  • Employee termination checklist

    Tools & Templates // May 2017 // provided by Tech Pro Research

    Separating employees from the business is never a pleasant process—nor is it always easy. Because many staff members have access to confidential data or company assets, it is critical to utilize a series of detailed and comprehensive steps to complete employee terminations and streamline the experience as much as possible. ...

    View This Now
  • Guidelines for building security policies

    Tools & Templates // Apr 2017 // provided by Tech Pro Research

    Building a successful set of security policies will ensure that your business stands the best possible chance of protecting company information, as well as safeguarding your customers, personnel, and reputation. The guidelines presented here will help you define the necessary components for building effective policies that meet the needs of ...

    View This Now
  • Identity theft protection policy

    Tools & Templates // Apr 2017 // provided by Tech Pro Research

    Help protect your employees and customers from identity theft. This policy outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred. The companion download, Lunch and learn: Dealing with the risks of identity theft, provides a ready-made PowerPoint ...

    View This Now
  • Electronic communication policy

    Tools & Templates // Feb 2017 // provided by Tech Pro Research

    This policy provides guidelines for the appropriate use of electronic communications. It covers privacy, confidentiality, and security and is intended to ensure that electronic communications resources are used for appropriate purposes only. From the policy: Summary The company provides access to and encourages the use of information ...

    View This Now
  • Remote access policy

    Tools & Templates // Dec 2016 // provided by Tech Pro Research

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. The download includes a PDF version, along with a ...

    View This Now