Tagged - security

Identify and Manage Security Risk Impacts on Your Organization

It is time to start looking at risk realistically and move away from “trust but verify” toward zero trust.

Identify and Manage Security Risk Impacts on Your Organization Storyboard

Use this research to better understand the negative impacts of third-party vendor actions on your organization.

Security Risk Impact Tool

Use this tool to help identify and quantify the security impacts of negative vendor actions.

Looking at Risk in a New Light: The 6 Pillars of Vendor Risk Management

It is increasingly likely that one of your vendors, or their n-party support vendors, will cause an incident. Therefore, organizations must protect themselves by creating...

Patch Management Policy

The patch management policy outlines standard application maintenance and patch management practices and responsibilities for identifying and mitigating any system...

Microsoft Exchange 2017 Outlook

Small and medium-sized businesses (SMBs) currently supporting Microsoft Exchange understand that new features alone do not warrant an upgrade. Staying on top of updates...

Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

PDA Usage Policy

The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...

Don’t Be Shellshocked - Eliminate the Security Risks of Shellshock Quickly

Eliminate the security risks of Shellshock quickly. A brief research note for Info-Tech’s members.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us