IT Security

The following 182 items are listed by Content Data.

Articles

Importance of Internal Controls for Cybersecurity

Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Mon, Jun 14, 2021
Policies & Procedures

Encryption Key Policy

This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Mon, Jun 14, 2021
Memos

IT Network Security Scope Memo

The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content
Mon, Apr 19, 2021
Articles

Tech Can Help Oil and Gas Firms Survive Market Turmoil

Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content
Mon, Apr 5, 2021
Policies & Procedures

End-User Information Security Background Policy

This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Mon, Mar 29, 2021
Policies & Procedures

Data Classification Standard Policy

This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Mon, Mar 15, 2021
Policies & Procedures

Connection to Untrusted Network Standard Policy

This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Mon, Mar 8, 2021
Policies & Procedures

IT Auditing and Logging Standard Policy

The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Mon, Feb 8, 2021
Policies & Procedures

IT and Telephony Systems Acceptable Use Policy

This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Mon, Jan 25, 2021
Articles

Data Privacy Isn’t Just One and Done: How to Stay on Top of Changes and Ensure Ongoing Compliance

Here, we provide an overview of recent data privacy regulations and explain steps organizations must take to operate an ...
Subscriber Content
Mon, Jan 25, 2021
Policies & Procedures

Printer Policy

This sample printer policy can be used by organizations to facilitate the appropriate and responsible business use of th...
Subscriber Content
Mon, Jan 18, 2021
Checklists & Questionnaires

Identity Management Tool Questionnaire

The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Mon, Nov 9, 2020