• Whistleblower policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    A whistleblower is defined as a person who spots or is made aware of unauthorized or illegal activity taking place within an organization and elects to report it to the appropriate individuals. Facilitating whistleblowers and protecting them from repercussions is essential to ensure companies and employed personnel behave with ethics...

    Download Now
  • Hiring Kit: .Net developer

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Are you seeking to integrate the various parts of your internal online functions or your external online presence? You could probably use a .Net developer to help lead the way. The .Net developer has a thorough understanding of Microsoft’s .Net Framework, which consists of a number of different essentials for...

    Download Now
  • Document retention policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Establishing proper timeframes for the storage of sensitive or private documents is essential to efficient company guidelines. Keeping documents for too short a period of time may negatively impact business operations or customer interactions. On the other hand, retaining documents for too long a period may violate rules or legal...

    Download Now
  • Hiring Kit: Computer Hardware Engineer

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Computer Hardware Engineers design and create the physical components that make computers, smartphones, sensors, and other digital devices run. Because of the meticulous nature of the work, the best candidates will have an inherent ability to focus on the task at hand. This Hiring Kit from TechRepublic Premium provides a...

    Download Now
  • Quick glossary: Backup solutions

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    The practical implementation of effective backup solutions can be overwhelmed by jargon and cryptic terminology. This quick glossary from TechRepublic Premium can help you understand these concepts and provide a framework for learning to master the art of data backup procedures and solutions. From the Glossary: Data is arguably the...

    Download Now
  • Hiring Kit: Security architect

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Developing and implementing both preventive security protocols and effective response plans is complicated and requires a Security architect with a clear vision. This hiring kit from TechRepublic Premium provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for your organization. From the Hiring...

    Download Now
  • Research: How 5G will transform business

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Now that 5G access is becoming available in major US cities, it may significantly impact how businesses use the Internet of Things (IoT). 5G promises higher bandwidth and ultra-reliable, low latency communications, which are needed for the next generation of IoT devices to drive the digital transformation of business processes,...

    Download Now
  • Access management policy

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company....

    Download Now
  • Bring your own device (BYOD) policy

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    The Bring Your Own Device (BYOD) movement has helped business save money on technological spending by allowing employees to use their own mobile devices, tablets or other electronics to conduct company operations. The convenience of letting users rely upon devices they are familiar with (and for which they have their...

    Download Now
  • Quick glossary: Cybersecurity countermeasures

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Cybersecurity attacks are inevitable for modern business. Therefore, it is vital that businesses deploy countermeasures to mitigate the damage these attacks cause. This quick glossary from TechRepublic Premium explains the terminology behind the most common cybersecurity countermeasures in use today and will help you understand what factors you should consider...

    Download Now