Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Auditing and logging policy

    Tools & Templates · Feb 2018 · Provided By TechRepublic Premium

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks, and devices that store or transport critical data. From the policy: Summary Many computer systems, network devices, and other technological hardware...

    View this now
  • Data classification policy

    Tools & Templates · Jan 2018 · Provided By TechRepublic Premium

    The integrity of sensitive data is vital to the overall success of an enterprise. Unauthorized access to restricted data could risk an organization's existence, so a strong, comprehensive policy is practically mandatory. This sample Data Classification Policy offers a framework and set of procedures to help your organization safeguard its...

    View this now
  • Encryption policy

    Tools & Templates · Jan 2018 · Provided By TechRepublic Premium

    Encryption offers a means of protecting data in transit or stored on devices--but organizations must follow proven methods and adhere to current standards for it to be effective. This policy outlines tested and recommended encryption technologies to help secure your corporate data. From the policy: Ciphers that are...

    View this now
  • Securing Linux policy

    Tools & Templates · Sep 2017 · Provided By TechRepublic Premium

    Linux has been the backbone of many businesses for decades. It has powered web servers, database systems, development machines, and employee workstations. And as with any OS, it’s essential to ensure that security standards are met in corporate environments. This policy offers guidelines for securing Linux on company computers and...

    View this now
  • Information security incident reporting policy

    Tools & Templates · May 2017 · Provided By TechRepublic Premium

    Make sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to a security incident and offers guidelines on the steps they should take. From the policy: Summary Confidential information must be kept secure to...

    View This Now
  • Employee termination policy

    Tools & Templates · May 2017 · Provided By TechRepublic Premium

    Whether due to resignation, layoff, or firing, separating employees from the business is never a pleasant process. Even so, it’s critical to follow a systematic procedure to ensure that all necessary measures are taken. This policy provides guidelines for disabling former employee access, reclaiming company equipment, and finalizing payroll/benefits details....

    View this now
  • IBM - Spectrum Protect Executive Demo

    Tools & Templates · May 2017 · Provided By IBM

    Anyone can be a data protection expert by using the Operations Centre! Even with thousands of systems, virtual machines, and applications over multiple sites, you can quickly verify that your data is protected and identify any trouble spots. You can follow the task scenarios that are provided...

    Free Trial
  • Guidelines for building security policies

    Tools & Templates · Apr 2017 · Provided By TechRepublic Premium

    Building a successful set of security policies will ensure that your business stands the best possible chance of protecting company information, as well as safeguarding your customers, personnel, and reputation. The guidelines presented here will help you define the necessary components for building effective policies that meet the needs of...

    View this now
  • Media disposal policy

    Tools & Templates · Sep 2016 · Provided By TechRepublic Premium

    This policy offers specific guidelines for ensuring that organization data is properly protected when you dispose of old storage media. From the policy: Summary The organization’s data and information possess tremendous value and must always be safeguarded. Specific processes exist to make sure that all organization storage media...

    View this now
  • Secure equipment repair policy and confidentiality agreement

    Tools & Templates · Sep 2016 · Provided By TechRepublic Premium

    This policy and agreement will help you define security requirements and monitor the status of equipment being repaired when your organization works with third parties to fix failed systems. From the policy: Summary Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers, and other...

    View this now