North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

System Configuration and Change Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

PCI DSS 2.0: On the Right Track!

October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of changes within PCI DSS...

WannaCry – Addressing the Unprecedented Global Ransomware Attack

Protect yourself against the WannaCry ransomware attack.

E-Discovery: What It Is and How It Affects IT

Electronic evidence is now a major deciding factor in court cases. Understand the mechanics of e-discovery prior to the acquisition or implementation of records...

IT Leaders: Learn the Laws Covering E-Mail Retention

Confused about which e-mails to retain, and for how long? IT leaders must demand clear guidance from the enterprise. IT can influence retention policy formation by...

Security Risk Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Asset Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Identity and Access Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Governance and Management Implementation Roadmap

Use this tool to build a roadmap to help you reach your target state.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us