article thumbnail

Network security policy

Tech Republic Security

This policy from TechRepublic Premium will help you create security guidelines for devices that transport and store data. From the policy: The IT department will be responsible for implementing, adhering to and maintaining these controls. The post Network security policy appeared first on TechRepublic.

Policies 123
article thumbnail

Information Security Incident Reporting Policy

Tech Republic Security

This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Penetration Testing and Scanning Policy

Tech Republic Security

System or network vulnerabilities and security threats can severely impact business operations or even shutter its doors. The purpose of this policy from TechRepublic Premium is to provide guidelines for appropriate penetration testing and scanning of computer systems and networks. It includes preparation,

Policies 114
article thumbnail

P2P File Sharing Policy

Tech Republic Security

The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing. From the policy: P2P applications should only be used to send.

Policies 129
article thumbnail

IT staff systems and data access policy

Tech Republic Security

IT pros typically have access to company servers, network devices and data so they can perform their jobs. This policy from TechRepublic Premium offers guidelines for governing access to critical systems and confidential data. From the policy: SUMMARY IT. From the policy: SUMMARY IT.

Policies 135
article thumbnail

Remote access policy

Tech Republic Security

PURPOSE This policy outlines guidelines and processes for requesting, obtaining, using and terminating remote access to organization networks, systems and data. From the policy: DETERMINING ELIGIBLE USERS Only users with a demonstrable business need. The post Remote access policy appeared first on TechRepublic.

article thumbnail

Information security incident reporting policy

Tech Republic Security

PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.