Tagged - security

Patch Management Policy

The patch management policy outlines standard application maintenance and patch management practices and responsibilities for identifying and mitigating any system...

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...

Systems Administrator

The System Administrator's role is to manage and tune in-house computer software systems and network connections to ensure high levels of availability and security of the...

Effectively Use SharePoint as Your ECM Solution

The newest evolution of SharePoint is the content file cabinet to the business’ everyday Office productivity tools, with a huge menu of possibilities. As a business...
  • guided implementation icon

IT Security Training Tool

In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

Instant Messaging Usage and Security Policy

The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.

ISO 27001:2013 Annex A Self-Check List

Use this check list to assess your CMM level based on ISO 27001:2013.

IT Security Manager

The IT Security Manager performs two core functions for the enterprise. The first is overseeing the operations of the enterprise's security solutions through management...

Data Center Access Policy

The data center access policy will outline the standards for regulating access to the company data center(s).
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us