
Today On Premium
-
TechRepublic Premium -
TechRepublic Premium IT hardware procurement policy
-
Image: Rawpixel/Adobe Stock -
TechRepublic Premium Auditing and logging policy
Premium Library
-
TechRepublic Premium Software licensing policy
Organizations spend a fortune on software licenses every year, and a lack of management around it can result in heavy fines. This policy will help you establish guidelines to make sure you’re in compliance and that any audits will be painless. From the policy: Staying in compliance with software licenses can be quite difficult. End ...
-
TechRepublic Premium IT hardware procurement policy
A strong hardware procurement policy will ensure that requirements are followed and that all purchases are subject to the same screening and approval processes. This comprehensive policy covers the essential aspects of the purchasing process. From the policy: PURPOSE This policy establishes a framework for the purchase of company hardware in a fashion that will: ...
-
Image: Rawpixel/Adobe Stock TechRepublic Premium TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
-
TechRepublic Premium Auditing and logging policy
Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks and devices that store or transport critical data. From the policy: Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various ...
-
TechRepublic Premium Shadow IT policy
Shadow IT is a concept whereby an organization’s employees use technology, services or systems without the knowledge of or approval from the IT department. It has arisen due to several reasons: Advances in cloud computing, which involve the usage of applications or sharing of data in public environments previously owned by IT. The evolution of ...
-
TechRepublic Premium Vendor contract renewal planner
Determining how and when to renew support contracts can be tedious and time-consuming. Our vendor contract renewal planner will help you schedule support renewals and budget the related costs. From the planner: Some companies schedule their support contract renewals to take effect all at once, such as on January 1. This provides a convenient renewal ...
-
TechRepublic Premium Access management policy
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...
-
TechRepublic Premium IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from TechRepublic Premium offers guidelines for governing access to critical systems and confidential data. From the policy: SUMMARY IT ...
-
TechRepublic Premium Windows administrator’s PowerShell script kit
The Windows GUI is the traditional way to perform administrative tasks, but scripting offers faster and more versatile methods that can help further your technical skills. This download includes 21 publicly available PowerShell scripts, along with a document explaining each one, to help you up your scripting game and administer your AD environment more efficiently. ...
-
TechRepublic Premium Scheduled downtime policy
Maintenance tasks, equipment upgrades and installations must be completed regularly — potentially creating disruptions and preventing employees from doing their work. This policy is designed to help your organization determine procedures for scheduling and communicating server, system and network downtime with the goal of minimizing the impact and inconvenience for your staff, clients and contractors. ...
Upcoming Downloads
- Hiring Kit: Human resource specialist
- Hiring Kit: Computer Forensic Analyst
- Hiring Kit: Blockchain Engineer