GDPR Consent Request Forms: Sample Text

The European Union’s General Data Protection Regulation requires every organization that collects sensitive personal data from those residing in the EU to ask for clear and specific consent before collecting that data. The three sample texts from TechRepublic Premium will provide a customizable framework for your organization to use and stay compliant. From the download: …

Read More

EU GDPR Compliance Checklist

The EU General Data Protection Regulation is a comprehensive set of rules designed to keep the personal data of all EU citizens collected by any organization, enterprise or business safe from unauthorized access or use. The GDPR went into effect on May 25, 2018, and organizations need to comply. Failure to do so, would be …

Read More

MSP Best Practices: PC Maintenance Checklist

Regularly performing preventive PC maintenance provides managed services providers with an excellent opportunity to spot previously unidentified issues that could become bigger problems later. There’s a lot to remember when performing preventive maintenance. MSPs can simplify the process by creating a PC maintenance checklist, such as the accompanying file from TechRepublic Premium. From the download: …

Read More

Quick Glossary: Cybersecurity Attacks

It doesn’t matter whether your organization is a huge multinational business enterprise or a one-person operation. At some point, your computer networks and systems will be attacked by someone with criminal intent. Cybersecurity attacks, in all their various forms, are inevitable and relentless. This quick glossary from TechRepublic Premium explains the terminology behind the most …

Read More

GDPR Data Breach Notification Letter

In the current business environment, it is almost inevitable that an organization will experience a security breach that exposes collected personal data to unauthorized access. Under the provisions of the General Data Protection Regulation, regardless of the severity of the security breach, organizations must inform their EU customers and stakeholders of the incident in a …

Read More

Quick Glossary: Malware

Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of terms from TechRepublic Premium will help you grasp the vocabulary that describes malware and the technology that spawns it. From …

Read More

Identity Theft Protection Policy

Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since identity theft can still occur …

Read More

Point of Sale Security Guide and Checklist

For retail businesses, the POS system is arguably their most important IT system. This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise. From the guide: ACCESS CONTROLS The first line of defense in any POS system is the control of both physical and network …

Read More

SSL Certificate Best Practices Policy

SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers. The purpose of this SSL Certificate Best Practices Policy from TechRepublic …

Read More

Secure Equipment Repair Policy and Confidentiality Agreement

Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers and other IT equipment. This policy from TechRepublic Premium ensures that the organization maintains regulatory and best business practice security compliance while tracking systems when they are being repaired. From the policy: If IT equipment must be returned to the manufacturer …

Read More
X