Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of brianhook

brianhook

Send brianhook an email

Latest from brianhook

  • Tips for effectively managing teleworkers
    Networking

    Tips for effectively managing teleworkers

    Some 28 million American workers do at least part of their jobs from home offices, telework centers, or other remote locations. Here are some guidelines for successfully managing teleworkers.

    brianhook
    Published:  July 30, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:17 AM PDT Read More See more Networking
  • Protecting your organization against ghost workers
    Tech & Work

    Protecting your organization against ghost workers

    Ghost workers include former employees and contractors who are no longer on the payroll. These ghosts, however, are still able to access and use company resources, systems, and accounts. Here are strategies to address the threat.

    brianhook
    Published:  July 17, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:18 AM PDT Read More See more Tech & Work
  • A multilayered strategy helps neutralize internal security threats
    Security

    A multilayered strategy helps neutralize internal security threats

    The biggest security threat in an organization is internal. Experts in the field suggest you protect yourself by layering components in a full security strategy that includes technologies, policies, procedures, and practices.

    brianhook
    Published:  July 1, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:17 AM PDT Read More See more Security
  • How to stop spam and keep e-mail moving
    Security

    How to stop spam and keep e-mail moving

    Spam is more than a nuisance; it is a serious threat to your network. Managed properly, e-mail filtering software can reduce the risk. Here is how to tune your filter so it stops spam without choking off enterprise e-mail.

    brianhook
    Published:  May 3, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:09 AM PDT Read More See more Security
  • Lock IT Down: Are hackers in hiding or aiming at new targets?
    Security

    Lock IT Down: Are hackers in hiding or aiming at new targets?

    How to report a computer crime

    brianhook
    Published:  April 9, 2002, 12:00 AM PDT Modified:  June 8, 2007, 9:09 AM PDT Read More See more Security
  • Get IT Done: More options for secure collaboration
    Networking

    Get IT Done: More options for secure collaboration

    Procedures for established secure, collaborative VPN services are outlined

    brianhook
    Published:  February 13, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:15 AM PDT Read More See more Networking
  • Download a glossary of security terms
    Security

    Download a glossary of security terms

    The events of 9/11 have heightened awareness of the new security threats to today's enterprises. To help IT executives better understand and confront these threats, TechRepublic offers a glossary of cybersecurity terms to help keep you up to date.

    brianhook
    Published:  January 21, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:24 AM PDT Read More See more Security
  • 2002 hiring plans dependent on region, tech specialty
    Tech & Work

    2002 hiring plans dependent on region, tech specialty

    If you're not hiring new staff in the first quarter of 2002, you're not alone. Recent surveys and polls report that only 10 to 15 percent of CIOs plan to add IT staff. The main culprit? A continuing weak economy.

    brianhook
    Published:  January 8, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:11 AM PDT Read More See more Tech & Work
  • No better time than now for disaster planning
    Data Centers

    No better time than now for disaster planning

    Disaster recovery can prove itself more valuable than any other IT endeavor, as many New York enterprises unfortunately learned in September. Read on as disaster experts share some steps to ensure your company is ready to respond to the unexpected.

    brianhook
    Published:  December 12, 2001, 12:00 AM PST Modified:  June 8, 2007, 9:10 AM PDT Read More See more Data Centers
  • High marks for Mangosoft’s VPN alternative
    Networking

    High marks for Mangosoft’s VPN alternative

    Despite the security risk, corporate users are still e-mailing sensitive data over the Internet. One way to safeguard this critical information is by building a VPN. But there's a cheaper, and simpler, alternative that CIOs might want to consider.

    brianhook
    Published:  December 4, 2001, 12:00 AM PST Modified:  June 8, 2007, 9:24 AM PDT Read More See more Networking
  • 1
  • 2
  • Next
15 results

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice