Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Computer Equipment Disposal policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    Computers, laptops, servers, and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer, some equipment is recycled, and other systems are given to employees or donated. Systems must be properly processed, and sensitive, proprietary, and all other organization information must be properly removed...

    Download Now
  • Internet and Email Usage policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    Internet and email communications are essential for performing modern business tasks, but companies must put rules in place to reduce the risks that come along with those technologies. This policy offers guidelines to help ensure that both IT and users follow safe practices when using electronic communications such as messaging...

    Download Now
  • Remote access policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees connect remotely to in-house data centers as well as offsite facilities, such as cloud providers. From the policy: Secure remote access to company systems...

    Download Now
  • Network security policy

    Downloads · Apr 2020 · Provided By TechRepublic Premium

    This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: Summary Every company’s network is made up of devices that transmit and store...

    Download Now
  • Password management policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible. From the policy: Employee passwords are the first line of defense in securing the organization from inappropriate...

    Download Now
  • Security Awareness and Training policy

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: Summary A security policy is only as valuable as the knowledge and efforts of those who adhere to...

    Download Now
  • Coronavirus and its impact on the enterprise

    Downloads · Mar 2020 · Provided By TechRepublic Premium

    COVID-19 has spread to multiple countries, including the United States, causing some businesses and schools to close, disrupting supply chains, and forcing some employees to work remotely from their homes. This TechRepublic Premium ebook is a compilation of the latest information including which tech conferences were canceled, related cybersecurity attacks,...

    View This Now
  • Risk Management Policy

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impact. It’s not an easy process,...

    Download Now
  • Hiring Kit: Security architect

    Downloads · Feb 2020 · Provided By TechRepublic Premium

    Developing and implementing both preventive security protocols and effective response plans is complicated and requires a Security architect with a clear vision. This hiring kit from TechRepublic Premium provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for your organization. From the Hiring...

    Download Now
  • Quick glossary: Cybersecurity countermeasures

    Downloads · Jan 2020 · Provided By TechRepublic Premium

    Cybersecurity attacks are inevitable for modern business. Therefore, it is vital that businesses deploy countermeasures to mitigate the damage these attacks cause. This quick glossary from TechRepublic Premium explains the terminology behind the most common cybersecurity countermeasures in use today and will help you understand what factors you should consider...

    Download Now