SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications...more
IT Policies
P2P File Sharing Policy
The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing....more
Securing Linux Policy
Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy...more

Abnormal Security: Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits
Image: Timon/Adobe Stock A significant portion of social engineering attacks, such as phishing, involve cloaking a metaphorical wolf in sheep’s...more

Critical Insight Reports Fewer Cybersecurity Breaches in Health Care, Yet Victim Numbers Are Up in 2023
A new study by Critical Insight shows that cybersecurity attacks in the health care sector are hitting more individuals and...more
Drone Usage Policy
Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial...more
Encryption Policy
Encryption is vital for securing data, whether in transit or stored on devices. It can provide peace of mind that...more
Data Encryption Policy
The Data Encryption Policy’s purpose is to define for employees, computer users and IT department staff the encryption requirements to...more
Information Security Policy
This policy from TechRepublic Premium provides guidelines to safeguard company information, reduce business and legal risks and protect company investments...more
IT Physical Security Policy
This policy will help your organization safeguard its hardware, software and data from exposure to persons (internal or external) who...more