Some operations and tasks don’t require painstaking attention to detail. Unfortunately, processing payroll isn’t one of them. With sensitive salary...more
TechRepublic Premium
Data migration testing checklist: Through pre- and post-migration
Are you ready to complete a major data migration but not sure where to start? Or perhaps you’ve already completed...more
New employee checklist and default access policy
Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various...more
Computer Equipment Disposal policy
Computers, laptops, servers and other IT equipment are regularly replaced and decommissioned. Off-lease systems must be returned to the manufacturer,...more
Intrusion detection policy
All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an...more
Password management policy
Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices...more
Cloud computing policy
This policy provides guidelines for secure and effective cloud computing operations to ensure the integrity and privacy of company-owned information....more
Quick glossary: Cloud platform services
For modern businesses, cloud platforms and the services they provide are often the most effective way to establish a competitive...more
Quick glossary: Hybrid cloud technology
Keeping up with the latest in technological innovations requires a persistent pursuit of knowledge and understanding. The twenty-five concepts defined...more
Edge Computing quick glossary
Edge computing is an architecture intended to reduce latency and open up new applications. The terms around it can be...more