Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Internet and Email Usage policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging...

    Download Now
  • Remote access policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: Secure remote access to company systems...

    Download Now
  • Network security policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: Summary Every company’s network is made up of devices that transmit and store...

    Download Now
  • Password management policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    Download Now
  • Security Awareness and Training policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: Summary A security policy is only as valuable as the knowledge and efforts of those who adhere to...

    Download Now
  • Information security policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data. From the policy: Employee responsibilities An...

    Download Now
  • Hybrid Cloud: The best of all worlds eBook

    White Papers · Mar 2020 · Provided By IBM

    In a world of complex security, workload, and data hosting needs, enterprise leaders may find that a one-cloud-fits-all strategy does not appropriately address the needs of their organisation. A more customised and unique approach is needed to truly transform their digital landscape and provide them with the ability to deploy...

    Download Now
  • Coronavirus and its impact on the enterprise

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    COVID-19 has spread to multiple countries, including the United States, causing some businesses and schools to close, disrupting supply chains, and forcing some employees to work remotely from their homes. This TechRepublic Premium ebook is a compilation of the latest information including which tech conferences were canceled, related cybersecurity attacks,...

    View This Now
  • Cybersecurity strategy: New tactics, implementation challenges and effectiveness

    Research · Feb 2020 · Provided By TechRepublic Premium

    Security. In a single word you can stop IT pros in their tracks. With each passing year, network and system security becomes more of a challenge. And with the added bonus of containers, clouds, and edge computing, the issue of security has solidified its place at the top of every...

    Download Now
  • Navigating your hybrid Multicloud Visionwith IBM Power Systems

    White Papers · Feb 2020 · Provided By IBM

    Cloud computing has undoubtedly changed how enterprise IT is delivered. It has opened the door to compute and storage resources without limits, as well as a wealth of cloud services (e.g., artificial intelligence, weather data, etc.) for IT administrators to leverage and create the next wave of enterprise innovation. ...

    Download Now