Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • THE SPECTRUM OF MOBILE RISK

    Tools & Templates // Apr 2018 // provided by Lookout

    Understanding the full range of risks to enterprise data from mobility.Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and ...

    Find Out More
  • Comparison chart: VPN service providers

    Tools & Templates // Apr 2018 // provided by Tech Pro Research

    Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders and compares them across criteria such as OpenVPN support, pricing, connections, and logging. More on ...

    View This Now
  • Password management policy

    Tools & Templates // Mar 2018 // provided by Tech Pro Research

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate ...

    View This Now
  • Information security policy

    Tools & Templates // Mar 2018 // provided by Tech Pro Research

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An ...

    View This Now
  • IT physical security policy

    Tools & Templates // Mar 2018 // provided by Tech Pro Research

    This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: Physical security guidelines and requirements The following guidelines should be followed in designing ...

    View This Now
  • EU General Data Protection Regulation (GDPR) compliance checklist

    Tools & Templates // Mar 2018 // provided by Tech Pro Research

    Far too many enterprises are unprepared to comply with the GDPR provisions, even though those organizations are liable for the consequences if they don’t. This checklist provides a baseline assessment of your company’s preparedness. More on the GDPR: A lack of awareness about the forthcoming introduction of General ...

    View This Now
  • EU General Data Protection Regulation (GDPR) policy

    Tools & Templates // Feb 2018 // provided by Tech Pro Research

    The GDPR is designed to protect the personal data of all EU citizens and will be enforced on any organization, regardless of location, that collects and/or processes personal data. Failing to comply with the GDPR could be a costly, and potentially devastating, mistake. This policy will help ensure compliance before ...

    View This Now
  • Auditing and logging policy

    Tools & Templates // Feb 2018 // provided by Tech Pro Research

    Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and logging procedures for computer systems, networks, and devices that store or transport critical data. From the policy: Summary Many computer systems, network devices, and other technological hardware ...

    View This Now
  • Data classification policy

    Tools & Templates // Jan 2018 // provided by Tech Pro Research

    The integrity of sensitive data is vital to the overall success of an enterprise. Unauthorized access to restricted data could risk an organization's existence, so a strong, comprehensive policy is practically mandatory. This sample Data Classification Policy offers a framework and set of procedures to help your organization safeguard its ...

    View This Now
  • Encryption policy

    Tools & Templates // Jan 2018 // provided by Tech Pro Research

    Encryption offers a means of protecting data in transit or stored on devices--but organizations must follow proven methods and adhere to current standards for it to be effective. This policy outlines tested and recommended encryption technologies to help secure your corporate data. From the policy: Ciphers that are ...

    View This Now