Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • IBM Security Verify Demo

    Tools & Templates · Sep 2020 · Provided By IBM

    IBM Security Verify brings context and intelligence to decisions about who should have access to what, empowering organizations with risk-based authentication and Adaptive Access. Explore the demo and learn how to master the balance between security and user experience.

    View This Now
  • Intrusion detection policy

    Tools & Templates · Sep 2020 · Provided By TechRepublic Premium

    All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this...

    View This Now
  • Payroll processing checklist

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    Some operations and tasks don’t require painstaking attention to detail. Unfortunately, processing payroll isn’t one of them. With sensitive salary and wage information, bank and direct deposit accounts, social security numbers, and other personal information in play, the stakes are high. When preparing a payroll run or supporting payroll operations,...

    View This Now
  • WordPress security checklist

    Tools & Templates · Aug 2020 · Provided By TechRepublic Premium

    Stories of virus and malware infections, data loss, systems compromise and unauthorized access dominate headlines, and your WordPress website may be contributing to the problem. I could share the percentage of WordPress-powered sites that become compromised, but the statistic is so high you might think I’m exaggerating. The fact remains:...

    View This Now
  • Identity theft protection policy

    Tools & Templates · Jul 2020 · Provided By TechRepublic Premium

    Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since...

    View This Now
  • Incident response policy

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    Every enterprise needs to establish a plan of action to assess and then recover from unauthorized access to its network. This policy provides a foundation from which to start building your specific procedures. From the policy: Policy details Whether initiated with criminal intent or not, unauthorized access...

    View This Now
  • SSL certificate best practices policy

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications, which communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers. Because of their criticality in protecting...

    View This Now
  • RFP templates and guidebook

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    Requests for Proposals (RFPs) are a common method for soliciting vendor quotes and answers about potential offered products or services and are intended to receive details involving implementation, operations and maintenance. This facilitates the decision making process by allowing organizations to choose the RFP responses which best suit their needs....

    View This Now
  • Comparison chart: VPN service providers

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders and compares them across criteria such as OpenVPN support, pricing, connections, and logging. More on...

    View This Now
  • Remote Access Checklist

    Tools & Templates · Jun 2020 · Provided By TechRepublic Premium

    This Remote Access Checklist from TechRepublic Premium should be used to ensure all employees have the requisite items, accounts, access, and instructions needed for remote work. It should be filled out by the IT department and signed off on by the employee and their supervisor/manager. This checklist can be customized...

    View This Now