Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Plan for anything, be ready for everything.

    Tools & Templates · May 2021 · Provided By IBM

    Many organizations aren’t ready for major disruptions, especially those with planning processes characterized by scattered spreadsheets, siloed data, and misaligned strategies. To thrive in volatility, you need an AI-powered planning solution that automates processes, gives you the flexibility to pivot quickly, and puts predictive capabilities into your hands to create...

    View This Now
  • Discover the power of predictive forecasting.

    Tools & Templates · May 2021 · Provided By IBM

    You need an AI-powered planning solution that augments human intelligence, so that your employees can spend less time manually aggregating data, and more time on analysis and higher-value work. And with predictive capabilities, put the power of algorithmic forecasting in the hands of your users for more accurate, consistent and...

    View This Now
  • macOS tune up checklist

    Tools & Templates · Apr 2021 · Provided By TechRepublic Premium

    Macs, like Windows computers, benefit from routine maintenance. Regular tune ups help protect Macs—both desktop and laptop models—from potential data loss, needlessly slow performance and other issues. There are two tricks to performing proper macOS tune ups. The first challenge people face is simply regularly remembering to perform the tune...

    View This Now
  • Data encryption policy

    Tools & Templates · Mar 2021 · Provided By TechRepublic Premium

    The Data encryption policy, from TechRepublic Premium, describes the data protection requirements for all organization data accessed using, or stored on, any electronic device, computer, network or system. From the policy: Purpose The policy’s purpose is to define for employees, computer users and IT department staff the encryption requirements to...

    View This Now
  • Security incident response policy

    Tools & Templates · Mar 2021 · Provided By TechRepublic Premium

    The Security Incident Response Policy, from TechRepublic Premium, describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident. From the policy: Purpose The policy’s purpose is to define for employees, IT department staff and users the process to be followed when experiencing a suspected...

    View This Now
  • Electronic Data Disposal Policy

    Tools & Templates · Mar 2021 · Provided By TechRepublic Premium

    Electronic data is likely to be more prevalent in today’s organizations than physical printed data. Reams worth of documents can now be stored on computer hard drives, handheld devices and storage cards smaller than a fingernail. The bulk of many strategic operations depend on this digital information and the safe...

    View This Now
  • Electronic communication policy

    Tools & Templates · Mar 2021 · Provided By TechRepublic Premium

    This Electronic communication policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers privacy, confidentiality, and security and is intended to ensure that electronic communications resources are used for appropriate purposes only. From the policy: Summary The company provides access to and...

    View This Now
  • Free! Quickly Discover Over Privilege Risks!

    Tools & Templates · Feb 2021 · Provided By Thycotic

    Thycotic's free Least Privilege Discovery Tool helps identify privileged account risk and meet compliance requirements. Scan your environment and generate a detailed report that highlights over privilege risks. Identify accounts with local admin privileges Discover elevated privileges on resource and service accounts with credentials improperly shared or past...

    View This Now
  • Checklist: Server inventory

    Tools & Templates · Feb 2021 · Provided By TechRepublic Premium

    Threats from malware, cryptographic infections, and compromised networks have never been greater. Headlines regularly attest to such widespread problems, from infection-felled organizations to dangerous vulnerabilities in popular tools such as SolarWinds. Companies can’t protect their technological infrastructure, though, without a solid grasp of the actual equipment in play. A checklist,...

    View This Now
  • Checklist: Securing digital information

    Tools & Templates · Feb 2021 · Provided By TechRepublic Premium

    Digital information is generally the lifeblood of any given organization, containing essential company data needed to run the business. Paperless offices have become the norm across industries, and remote work depends on the ability to share electronic information for communication, announcements, and collaboration. All digital information should be appropriately secured...

    View This Now