IT Security

The following 204 items are listed by Content Data.
Protiviti Booklets

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Mon, Jan 29, 2018
Checklists & Questionnaires

Information Security Risk Assessment Questionnaire

This IT risk assessment questionnaire is designed to assist with reviewing and documenting the risk profile of your orga...
Subscriber Content
Mon, Dec 18, 2017
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT System Pre-Implementation Review Audit Report

This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Mon, Nov 27, 2017
Policies & Procedures

IT System Access and Re-Certification Policy

This sample establishes the standards and procedures for maintaining proper system access security at a company.
Subscriber Content
Mon, Aug 7, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017
Policies & Procedures

Patient Admission Policy

This sample policy provides a consistent, standardized and proficient method for the admission of patients.
Subscriber Content
Mon, May 29, 2017
Benchmarking Tools

External Access Risk Key Performance Indicators (KPIs)

This tool outlines the business risks associated with inappropriate access to systems, data or information and suggests ...
Subscriber Content
Mon, May 22, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Policies & Procedures

Server Configuration Policy

This policy defines the standard security settings utilized on a company's servers.
Subscriber Content
Mon, Oct 17, 2016