Scott Matteson

Contributing Writer

Scott Matteson is a senior systems administrator and freelance technical writer who also performs consulting work for small organizations. He resides in the Greater Boston area with his wife and thre...

SHOW MORE

Scott Matteson has nothing to disclose. They do not hold investments in the technology companies they cover.

Latest from Scott Matteson

  • Business continuity policy

    It’s an unfortunate fact of life in today’s world that both natural and manmade disasters can place businesses at risks both moderate and severe. Whether caused by earthquakes, hurricanes, blizzards, ...

    TechRepublic Premium · September 5, 2019, 5:00 PM PST

  • Development lifecycle policy

    Software development is a complex process which involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with crea...

    TechRepublic Premium · August 27, 2019, 5:00 PM PST

  • Third party vendor policy

    In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organiz...

    TechRepublic Premium · August 27, 2019, 5:00 PM PST

  • Asset control policy

    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in...

    TechRepublic Premium · August 18, 2019, 5:00 PM PST

  • Moonlighting policy

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology...

    TechRepublic Premium · August 7, 2019, 5:00 PM PST

  • Perimeter security policy

    As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and ...

    TechRepublic Premium · July 31, 2019, 5:00 PM PST

  • Patch management policy

    Patching of operating systems, applications and devices is not usually ranked as a favorite endeavor of IT professionals, but it’s a critical pro-cess to ensure secure company operations as well as to...

    TechRepublic Premium · July 31, 2019, 5:00 PM PST

  • Artificial intelligence ethics policy

    The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence. This policy can be customized as needed to fit the needs of your organization....

    TechRepublic Premium · July 11, 2019, 5:00 PM PST

  • Mobile device security policy

    More and more users are conducting business on mobile devices. This can be due to increases in remote workers, travel, global workforces, or just being on-the-go. This policy provides guidelines for m...

    TechRepublic Premium · June 6, 2019, 5:00 PM PST