Security
Topics
-
CIO1482
-
Infrastructure & Operations1686
-
Enterprise Architecture519
-
Applications1381
-
Project & Portfolio Management612
-
Data & Business Intelligence615
-
Security979
-
Vendor Management567
-
Templates & Policies119
-
-
Application Development12
-
Budgeting/Procurement11
-
Collaboration1
-
Communications3
-
Data & Digital Assets12
-
Department Governance26
-
Desktop Systems4
-
Disaster & Continuity10
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications10
-
Hardware13
-
HR Management9
-
Mobile & Wireless7
-
Network Management4
-
Operating Systems1
-
Operations11
-
Project Management17
-
Security19
-
Small Business Essentials9
-
Small Business Extras2
-
Storage5
-
Web Site Development4
-
Types of Content
GPS Cell Phone PolicyThe GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating... |
|
Web Content Filter Test ChecklistWhen testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the... |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
Anti-Virus PolicyThe anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help... |
|
Administrative Rights PolicyThe administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use... |
|
Removable Media Acceptable Use PolicyThe removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable... |
|
DRP Test WorksheetDon't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event... |
|
Server Configuration PolicyThe server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company. |
|