Implement Risk-Based Vulnerability Management

Vulnerabilities will always exist. Addressing these will consume your department’s time and resources, and your efforts will quickly become stale as new vulnerabilities...
  • guided implementation icon

WannaCry – Addressing the Unprecedented Global Ransomware Attack

Protect yourself against the WannaCry ransomware attack.

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform vendors. To complicate...

Endpoint Encryption Solution RFP Template

Issuing RFPs is a critical step in your vendor selection process. This RFP template comes populated with important elements you don't want to forget. A detailed RFP saves...

Employee Termination Process Checklist – IT Security Example

Use flowcharts and checklists to create effective SOP documents.

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

Endpoint Encryption Evaluation & RFP Response Tool

This tool is pre-built with the essential criteria that should be considered when evaluating RFP responses. Use this tool to put hard numbers behind vendor claims, and...

Develop and Deploy Security Policies

Informal, un-rationalized, ad hoc policies are ineffective because they do not explicitly outline responsibilities or compliance requirements, and they are rarely...
  • guided implementation icon
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us