Security Risk, Strategy & Governance

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

Endpoint Encryption Solution RFP Template

Issuing RFPs is a critical step in your vendor selection process. This RFP template comes populated with important elements you don't want to forget. A detailed RFP saves...

Employee Termination Process Checklist – IT Security Example

Use flowcharts and checklists to create effective SOP documents.

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform vendors. To complicate...

MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements. This...

Peer Survey Results Overview April 2011

Info-Tech recently conducted several surveys for our research projects. This document is a high level summary of those results and an introduction to the resulting research.

Security Service Catalog Template

Use this catalog template to create a formal list of information security services offered and service level agreements.

WannaCry – Addressing the Unprecedented Global Ransomware Attack

Protect yourself against the WannaCry ransomware attack.

PDA Usage Policy

The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...

Comply with the Security Requirements of HIPAA or SOX

Focus on translating wordy or ambiguous security obligations into security requirements that can be turned into actions and initiatives to be prioritized and carried out.
  • guided implementation icon
GET HELP Contact Us
×
VL Methodology