SUMMARYRisk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and...more
IT Policies
Security incident response policy
The Security Incident Response Policy, from TechRepublic Premium, describes the organization’s process for minimizing and mitigating the results of an...more
Transmission of sensitive data policy
Data in transit means data is at risk if the proper precautions aren’t followed. Data stored inside a securely monitored...more
Security awareness and training policy
This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that...more
Internet and email usage policy
Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance,...more
Auditing and logging policy
Auditing and logging are essential measures for protecting mission-critical systems and troubleshooting problems. This policy outlines the appropriate auditing and...more
Access management policy
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital...more
IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that...more
Cloud data storage policy
Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business...more
Big data policy
The unique components behind big data can be challenging to administer and maintain. This policy offers guidelines to help businesses...more