IT Security

The following 210 items are listed by Content Data.
Guides

IT Security Awareness and Training Program Guide

We've designed this guide to help companies implement and strengthen security training and awareness.
Mon, Dec 4, 2023
Policies & Procedures

Infrastructure Policy: Laptops

This policy describes the security precautions that must be taken by all individuals who have a company-issued laptop or...
Mon, Nov 27, 2023
Policies & Procedures

Information Security Development Policy

This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Mon, Nov 20, 2023
Policies & Procedures

Help Desk Infrastructure Policy

This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Mon, Oct 23, 2023
Articles

The 5G Effect: Lessons Learned From Real-World 5G Applications and the Road Map Ahead

This whitepaper highlights the role 5G will play in business and provides steps business leaders should take when prepar...
Subscriber Content
Mon, Oct 16, 2023
Policies & Procedures

Security and Access Policy

This Security and Access Policy provides a company with a single reference for governance pertaining to matters of secur...
Subscriber Content
Mon, Oct 2, 2023
Policies & Procedures

Banking/Financial Institution Account Policy

The purpose of this policy is to ensure that the company’s cash, investments and other assets are adequately controlled ...
Subscriber Content
Mon, Sep 11, 2023
Policies & Procedures

Password Security Policy

Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Mon, Sep 11, 2023
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 14, 2023
Audit Programs

Business Continuity Management Audit Work Program

This BCM work program includes two samples that will help you assess the effectiveness of your BCM program and identify ...
Subscriber Content
Mon, Jul 17, 2023
Policies & Procedures

IT Acquisition and Divestiture Policy

This policy can be used to define requirements for the integration of or separation from a company.
Subscriber Content
Mon, Jul 17, 2023
Audit Programs

Data Center Review Audit Work Program

This sample document contains two work programs that outline general steps organizations should take during a data cente...
Subscriber Content
Mon, Jul 10, 2023