Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital...more
TechRepublic Premium
IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that...more
Cloud data storage policy
Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business...more
Checklist: Securing Windows 10 systems
Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data...more
Malware response checklist
Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or...more
IT email templates: Security alerts
All company communication needs may vary but certain standard template messages can come in handy for IT staff to keep...more
Job description: MongoDB administrator
Open source database program MongoDB has become a hot technology, and MongoDB administrators are in high demand. This job description...more
Cloud data warehouse guide and checklist
Choosing a vendor to provide cloud-based data warehouse services requires a certain level of due diligence on the part of...more
Security risk assessment checklist
Organizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks...more
Big data policy
The unique components behind big data can be challenging to administer and maintain. This policy offers guidelines to help businesses...more