Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various...more
IT Policies
Computer Equipment Disposal policy
Computers, laptops, servers and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer,...more
Intrusion detection policy
All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an...more
Password management policy
Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices...more
Cloud computing policy
This policy provides guidelines for secure and effective cloud computing operations to ensure the integrity and privacy of company-owned information....more

Cosmetics giant Sephora first to be fined for violating California’s Consumer Privacy Act
Sephora will have to pay $1.2 million in penalties, inform California customers it sells their personal data and offer them...more

How ransomware attacks target specific industries
Analyzing over 100 prominent ransomware incidents, Barracuda found the top targeted sectors to be education, municipalities, healthcare, infrastructure and financial....more

Adopting a Technology Rotation Program from Dell Improves Operational and Cost Efficiencies for Storage
Dell storage customers interviewed are achieving a 60% savings over six years when they use Technology Rotation for their storage...more
Electronic Data Disposal Policy
Electronic data is likely to be more prevalent in today’s organizations than physical printed data. Reams worth of documents can...more