
Today On Premium
-
TechRepublic Premium -
TechRepublic Premium Hiring kit: Application engineer
-
TechRepublic Premium Employee performance review policy
-
TechRepublic Premium Employee time off policy
Premium Library
-
TechRepublic Premium User privilege policy
PURPOSE This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: Limiting the use of superuser accounts Users must not use administrator or root accounts — or similarly high-leveled account types — for tasks that do not require ...
-
Image: Yuichiro Chino/Moment/Getty Images TechRepublic Premium How to minimize security risks: Follow these best practices for success
To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium.
-
TechRepublic Premium Remote access policy
PURPOSE This policy outlines guidelines and processes for requesting, obtaining, using and terminating remote access to organization networks, systems and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: DETERMINING ELIGIBLE USERS Only users with a demonstrable business need ...
-
TechRepublic Premium Risk management policy
SUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impacts. It’s not an easy process, achieving a sound risk ...
-
TechRepublic Premium Security incident response policy
The Security Incident Response Policy, from TechRepublic Premium, describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident. From the policy: Whenever a user of an organization-provided computer, device, system, network application, cloud service or platform experiences a suspected technology-related security incident, the individual must immediately notify the IT ...
-
TechRepublic Premium Offshore work policy
It’s common practice for companies to use offshore employees or contractors in order to offload work to specialized individuals or reduce costs associated with certain tasks and responsibilities. This can free up staff to focus on more complex and valuable initiatives, and also ensure 24×7 operations for companies which rely upon on-call staff and subject-matter ...
-
TechRepublic Premium Employee objectives policy
One of the key responsibilities of managing employees is helping them develop their careers. And one of the best ways to do that is by establishing clear, measurable objectives toward achieving their goals. This policy offers a simple outline of what qualifies as an acceptable objective and how managers and employees can work toward a ...
-
TechRepublic Premium DNS and DHCP usage policy
Domain Name System and Dynamic Host Configuration Protocol are the foundation of essential network configuration and communication, especially DNS. Internal and external network access could not work as we know it without DNS, and DHCP is invaluable in provisioning temporary IP addresses for workstations and devices to utilize facility connectivity. The purpose of this policy ...
-
TechRepublic Premium MSP best practices: PC deployment checklist
For managed services providers, deploying new PCs and performing desktop and laptop migrations are common but perilous tasks. The adage “you’re only as good as your last performance” certainly applies. An MSP and its technicians can get everything right, complete a client’s complex cloud migrations, and perform remote work initiatives and proprietary business application upgrades, ...
-
TechRepublic Premium IT training policy
Successful IT departments are defined not only by the technology they deploy and manage, but by the skills and capabilities of their people. IT workers must keep up to date with the latest technology trends and evolutions, as well as developing soft skills like project management, presentation and persuasion, and general management. Due to the ...
Upcoming Downloads
- Hiring Kit: Human resource specialist
- Hiring Kit: Computer Forensic Analyst
- Hiring Kit: Blockchain Engineer