A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers and other encryption systems to protect...more
TechRepublic Premium
Equipment reassignment checklist
The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and...more
Google Chrome: Security and UI tips you need to know
Google’s Chrome web browser held a 64.92% command of the global browser market share in April 2023. That means more...more
Enterprise IoT calculator: TCO and ROI
Internet of Things devices serve a number of useful applications, such as environmental, asset or inventory monitoring/control, security functions, fitness...more
Checklist: Network and systems security
Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security...more
Document retention policy
The purpose of this policy from TechRepublic Premium is to provide guidelines for the appropriate retention and disposal of physical...more
Cloud platform spotlight: The top three contenders
PURPOSE When you evaluate cloud platforms, you need to compare features, costs, benefits, limitations and implementation details. TechRepublic Premium takes...more
Information security incident reporting policy
PURPOSEThis policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is...more
Mobile device security policy
PURPOSEThis Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses...more
Incident response policy
PURPOSEEvery enterprise needs to establish a plan of action to assess and then recover from unauthorized access to its network....more