article thumbnail

Guidelines for building security policies

Tech Republic Security

PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. Using this information, your business can establish new policies or elaborate on those.

article thumbnail

IT Physical Security Policy

Tech Republic Security

This policy will help your organization safeguard its hardware, software and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. The post IT Physical Security Policy appeared first on TechRepublic. Server room/IT.

Policies 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Information Security Incident Reporting Policy

Tech Republic Security

This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. From the policy: STEPS TO TAKE IF YOU SUSPECT AN INFORMATION SECURITY.

article thumbnail

Risk Management Policy

Tech Republic Security

The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impacts. The purpose of this policy. written by Scott Matteson for.

article thumbnail

Securing Linux Policy

Tech Republic Security

This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. From the policy: DEVELOP TEMPLATES BASED ON. Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades.

Linux 131
article thumbnail

Identity Theft Protection Policy

Tech Republic Security

This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since identity theft can still occur.

Policies 148
article thumbnail

P2P File Sharing Policy

Tech Republic Security

The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing. From the policy: P2P applications should only be used to send.

Policies 137