IT Security

The following 210 items are listed by Content Data.
Policies & Procedures

User Malicious Software Policy

The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Mon, May 28, 2012
Audit Programs

System Intrusion Audit Work Program

The objective of this audit work program is to evaluate a business’s ability to detect unauthorized system access attemp...
Subscriber Content
Mon, Mar 5, 2012
Policies & Procedures

Remote Network Access Policy

This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Mon, Sep 19, 2011
Process Flows

User Access Security Process Flow

This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Mon, Jun 20, 2011
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011
Protiviti Booklets

The Global Privacy and Information Security Landscape: Frequently Asked Questions

This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Mon, May 3, 2010
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Sun, Jul 16, 2017
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Tue, Feb 18, 2020
Blog

How IT Controls Enhance the Value of IT Assets

It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Thu, Oct 6, 2022
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Thu, Feb 21, 2019
Blog

New Content on KnowledgeLeader - 3/25/2024

ToolsThe following tools were published on KnowledgeLeader this week:IT Data Management PolicyOur IT D...
Mon, Mar 25, 2024