IT Security

The following 208 items are listed by Content Data.
Policies & Procedures

Remote Network Access Policy

This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Mon, Sep 19, 2011
Process Flows

User Access Security Process Flow

This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Mon, Jun 20, 2011
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011
Protiviti Booklets

The Global Privacy and Information Security Landscape: Frequently Asked Questions

This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Mon, May 3, 2010
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Sun, Jul 16, 2017
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Tue, Feb 18, 2020
Blog

How IT Controls Enhance the Value of IT Assets

It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Thu, Oct 6, 2022
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Thu, Feb 21, 2019
Blog

New Content on KnowledgeLeader - 3/25/2024

ToolsThe following tools were published on KnowledgeLeader this week:IT Data Management PolicyOur IT D...
Mon, Mar 25, 2024
Blog

New Content on KnowledgeLeader - 4/22/2024

ToolsThe following tools were published on KnowledgeLeader this week:Management Reporting: Purchasing ...
Mon, Apr 22, 2024
Blog

Risks Associated with Data Integrity and Management Best Practices

Failure to manage data integrity risk can have the following impact: Authorization, completeness,...
Mon, Oct 29, 2012