Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Remote access policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: Secure remote access to company systems...

    Download Now
  • Top 100+ tips for telecommuters and managers (free PDF)

    Downloads · Apr 2020 · Provided By TechRepublic

    While working remotely is a long-standing trend in IT, it’s now becoming a reality thanks to the spread of COVID-19. How can telecommuters work from home successfully? What equipment and collaborative software do they need? How do you curb distractions like Facebook, Instagram, and Twitter? This free PDF download compiled...

    Download Now
  • Password management policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    Download Now
  • Security Awareness and Training policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: Summary A security policy is only as valuable as the knowledge and efforts of those who adhere to...

    Download Now
  • Information security policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    Download Now
  • Kubernetes security guide (free PDF)

    Downloads · Mar 2020 · Provided By TechRepublic

    Kubernetes containers are now highly prevalent in multi-cloud environments and are being deployed widely across a variety of industries. As more companies adopt and scale their Kubernetes systems, security has to be a major point of interest. Otherwise, your containers, their underlying technologies, and your data could be at risk....

    Download Now
  • Safeguarding customer information policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Data breaches can cost companies tens of thousands of dollars or more and can pose a significant risk to company operations and reputation. Customer information is usually one of the favorite targets of hackers as it entails confidential details which can be used to commit property or identity theft. Even...

    Download Now
  • Coronavirus and its impact on the enterprise

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    COVID-19 has spread to multiple countries, including the United States, causing some businesses and schools to close, disrupting supply chains, and forcing some employees to work remotely from their homes. This TechRepublic Premium ebook is a compilation of the latest information including which tech conferences were canceled, related cybersecurity attacks,...

    View This Now
  • Internet Resource Access Policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Company devices which are hooked to the internet can involve both internal and external connections. These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations...

    Download Now
  • Quick glossary: Cybersecurity attack response and mitigation

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you better be prepared. This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. Familiarity with...

    Download Now