Passwords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible, they...
|
14
|
Use Info-Tech's Access Control Policy to define and document the necessary access control levels and processes across your organization.
|
10
|
Comprehensively developed and effectively deployed security policies enable IT professionals to work pro-actively rather than reactively, benefitting the entire...
|
9
|
The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.
|
8
|
The purpose of this policy is to ensure proper protection of a company’s assets that are accessed by suppliers.
|
8
|
System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...
|
8
|
The data center must be equipped with fire detection and suppression systems to identify and extinguish fire, abide by local, state and federal laws, codes and standards,...
|
8
|
An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements. This...
|
7
|
The Information Security Policy Charter is the “policy of policies” which outlines high-level security governance within the organization and the expectations associated...
|
7
|
Use Info-Tech's Configuration Management Policy to define how configurations will be managed.
|
7
|