
Today On Premium
-
TechRepublic Premium -
TechRepublic Premium Quick glossary: Storage
-
TechRepublic Premium Quick glossary: Metaverse
-
TechRepublic Premium iCloud Usage Policy
Premium Library
-
TechRepublic Premium How to work from home: IT pro’s guidebook to telecommuting and remote work
Work from home policies and fully remote jobs top the priority list of many workers. After all, who doesn’t love the idea of working in their pajamas? Working from home also offers fewer distractions and interruptions from colleagues, reduces the stress of commuting, and provides a better work-life balance, not to mention, less office politics. ...
-
TechRepublic Premium Internet Resource Access Policy
Company devices which are hooked to the internet can involve both internal and external connections. These internet resources can be web servers, email servers, proxy servers, routers, FTP servers or any other public-facing device which performs a service or function. Because these resources are both generally critical for company operations and especially vulnerable to risks, ...
-
TechRepublic Premium Hiring Kit: MIS Manager
MIS Managers must have a knowledge of the technology, deep understanding of the importance of reliable data, and the skillset to make sure everything runs smoothly and as expected. This Hiring Kit from TechRepublic Premium provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for your organization. In ...
-
TechRepublic Premium Quick glossary: Cybersecurity attack response and mitigation
Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you better be prepared. This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack. Familiarity with the terminology will help you ...
-
TechRepublic Premium Cybersecurity strategy: New tactics, implementation challenges and effectiveness
Security. In a single word you can stop IT pros in their tracks. With each passing year, network and system security becomes more of a challenge. And with the added bonus of containers, clouds, and edge computing, the issue of security has solidified its place at the top of every business’ list of concerns. TechRepublic ...
-
TechRepublic Premium Whistleblower policy
A whistleblower is defined as a person who spots or is made aware of unauthorized or illegal activity taking place within an organization and elects to report it to the appropriate individuals. Facilitating whistleblowers and protecting them from repercussions is essential to ensure companies and employed personnel behave with ethics and integrity, by establishing consequences ...
-
TechRepublic Premium Power checklist: New workstation
Welcoming a new employee to the office often requires the installation of a new computer workstation. This guide and the accompanying checklist from TechRepublic Premium will help you successfully complete the task of creating a new workstation for your business enterprise. There are several key elements to consider when establishing a new workstation ranging from ...
-
TechRepublic Premium Power checklist: Securing Windows Server 2016
Every operating system should be appropriately secured, especially server platforms, which will be accessed by multiple users and store confidential company information. Public-facing servers are at the greatest risk for malicious attacks and/or data breaches, and particular caution should be applied when deploying these. While not the most recent Windows Server version, Windows Server 2016 ...
-
TechRepublic Premium Disaster recovery and business continuity plan
Natural and man-made disasters can jeopardize the operations and future of any company, so it’s critical to develop a plan to help ensure ongoing business processes in a crisis. This download explains what needs to go into your DR/BC plan to help your organization prepare for—and recover from—a potential disaster. From the plan: Objective This ...
-
TechRepublic Premium Employee political activity policy
This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political affiliation. From the policy: Introduction No matter where in the world an enterprise operates, politics is going to play a major role in the lives ...
Upcoming Downloads
- Hiring Kit: Human resource specialist
- Hiring Kit: Computer Forensic Analyst
- Hiring Kit: Blockchain Engineer