Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • IT Resilience Maturity Benchmark Tool

    Tools & Templates // Sep 2018 // provided by Zerto

    More than 90% of organizations are falling short of what is advised for IT Resilience – and in turn, they are setting up their digital transformation imperatives and their business to fail. How prepared is your organization to drive digital transformation, while ensuring there are no disruptions – whether natural...

    View this now
  • THE SPECTRUM OF MOBILE RISK

    Tools & Templates // Apr 2018 // provided by Lookout

    Understanding the full range of risks to enterprise data from mobility.Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and...

    Find Out More
  • IT staff systems/data access policy

    Tools & Templates // Oct 2018 // provided by Tech Pro Research

    IT pros typically have access to company servers, network devices, and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy offers guidelines for governing access to critical systems and confidential data. From the...

    View This Now
  • IT Resilience Maturity Benchmark Tool from IDC

    Tools & Templates // Sep 2018 // provided by Zerto

    More than 90% of organizations are falling short of what is advised for IT Resilience – and in turn, they are setting up their digital transformation imperatives and their business to fail. How prepared is your organization to drive digital transformation, while ensuring there are no disruptions – whether natural...

    View this now
  • Quick glossary: Encryption

    Tools & Templates // Aug 2018 // provided by Tech Pro Research

    Encryption is vital to the success of every business that shares or transfers sensitive data via the internet. But encryption can be difficult to understand if you aren’t sure what the terminology refers to. This glossary will help you decipher the meaning of encryption terms and concepts. From the...

    View This Now
  • Free Privileged Password Security Policy Template

    Tools & Templates // Jul 2018 // provided by Thycotic

    With privileged account credentials a favorite target of hackers, it’s critical that you have password protection policies in place to prevent unauthorized access and demonstrate security compliance. We’ve make it easy for you. Our free Privileged Password Security Policy Template gives you best-practice policies to help your organization improve...

    View this now
  • GDPR security pack: Policies to protect data and achieve compliance

    Tools & Templates // May 2018 // provided by Tech Pro Research

    One of the key requirements of the newly enacted GDPR is a demonstrated effort to enforce security measures that safeguard customer data. This bundle includes six policies you can customize and implement to help your organization show good faith toward providing those data protections: Data classification Password...

    View This Now
  • Hiring kit: IT audit director

    Tools & Templates // May 2018 // provided by Tech Pro Research

    Security measures and other IT controls don’t work unless they’re implemented consistently, predictably, and with integrity. The IT audit director develops and schedules internal audits to measure and document whether those IT controls are followed as prescribed. This hiring kit includes a job description, sample interview questions, and a basic...

    View This Now
  • GDPR resource kit: Tools to become compliant

    Tools & Templates // May 2018 // provided by Tech Pro Research

    The deadline for GDPR compliance is growing near, yet a surprising number of organizations are unprepared to comply with the stringent data protection rules. This resource kit includes a GDPR policy and compliance checklist, a data compliance officer job description, a data breach notification letter, and sample text for several...

    View This Now
  • GDPR data breach notification letter

    Tools & Templates // Apr 2018 // provided by Tech Pro Research

    Once the GDPR becomes enforceable on May 25, 2018, organizations everywhere will be subject to stiff fines and penalties for noncompliance. This download includes an overview of the information required for a basic data breach notification as well as a sample letter to help your organization create an appropriate response....

    View This Now