What Are Mobile VPN Apps and Why You Should Be Using Them

When you think of VPNs, chances are pretty good your thoughts go to the tried and true virtual private networks of old, which made it possible for you to securely connect to your company network (from a remote location) such that your local computer behaved as if it were within the company LAN. In this …
The post What Are Mobile VPN Apps and Why You Should Be Using Them appeared first on TechRepublic.

Read More

Password Management Policy

This policy from TechRepublic Premium provides guidelines for the consistent and secure management of passwords for employees and system and service accounts. These guidelines include mandates on how passwords should be generated, used, stored and changed as well as instructions for handling password compromises. From the policy: GENERAL REQUIREMENTS Blank or easily guessed passwords, such …
The post Password Management Policy appeared first on TechRepublic.

Read More

Information Security Policy

This policy from TechRepublic Premium provides guidelines to safeguard company information, reduce business and legal risks and protect company investments and reputation. It covers data. Its adjunct policy, the Network security policy, covers the systems and devices that transport and store data. This policy can be customized as needed to fit the needs of your …
The post Information Security Policy appeared first on TechRepublic.

Read More

IT Physical Security Policy

This policy will help your organization safeguard its hardware, software and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: PHYSICAL SECURITY GUIDELINES AND REQUIREMENTS The following guidelines should be followed in designing and enforcing access to IT assets. Server room/IT …
The post IT Physical Security Policy appeared first on TechRepublic.

Read More

Hiring Kit: IT Audit Director

Security measures and other IT controls only work if they are implemented consistently, predictably and with integrity. The IT audit director develops and schedules internal audits to measure and document whether those IT controls were followed as prescribed. This hiring kit from TechRepublic Premium can give your enterprise a head start on finding your ideal …
The post Hiring Kit: IT Audit Director appeared first on TechRepublic.

Read More

Safeguarding customer information policy

Data breaches can cost companies tens of thousands of dollars or more and can pose a significant risk to company operations and reputation. Customer information is usually one of the favorite targets of hackers as it entails confidential details which can be used to commit property or identity theft. Even innocent mistakes such as a …
The post Safeguarding customer information policy appeared first on TechRepublic.

Read More

Hiring kit: GDPR data protection compliance officer

The European Union’s General Data Protection Regulation requires every business enterprise and public authority that collects personal data from EU customers and clients to protect that data from unauthorized access. Finding ideal candidates for the GDPR data protection compliance officer position will require thorough vetting, and potential candidates may be difficult to find. This hiring …
The post Hiring kit: GDPR data protection compliance officer appeared first on TechRepublic.

Read More

Network security policy

This policy from TechRepublic Premium will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: The IT department will be responsible for implementing, adhering to and maintaining these controls. For the purposes …
The post Network security policy appeared first on TechRepublic.

Read More

Hiring kit: Cryptographer

A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers and other encryption systems to protect sensitive data. It can be a difficult position to fill. This hiring kit from TechRepublic Premium provides a workable framework you can use to find the best cryptographer candidate for your business. It includes a …
The post Hiring kit: Cryptographer appeared first on TechRepublic.

Read More

Equipment reassignment checklist

The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other assets. It is essential to follow strict guidelines for equipment reassignment so that company investments, data and privacy are protected. The following checklist from TechRepublic Premium will help ensure that all the appropriate steps …
The post Equipment reassignment checklist appeared first on TechRepublic.

Read More
X