IT Security

The following 182 items are listed by Content Data.

Policies & Procedures

Printer Policy

This sample printer policy can be used by organizations to facilitate the appropriate and responsible business use of th...
Subscriber Content
Mon, Jan 18, 2021
Checklists & Questionnaires

Identity Management Tool Questionnaire

The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Mon, Nov 9, 2020
Audit Reports

Technical Support Function Audit Report

This sample audit report can be used by auditors for reviewing and noting opportunities for operational and control impr...
Subscriber Content
Mon, Sep 14, 2020
Audit Reports

IT Asset Management Audit Report

This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Mon, Aug 31, 2020
Memos

Data Governance Audit Scoping Memo

This sample memo serves as a report of an internal audit function’s high-level assessment of the company’s data governan...
Subscriber Content
Mon, Jun 1, 2020
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Wed, Feb 19, 2020
Newsletters

Responsible Privacy: Is the Board Doing Its Part?

This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Mon, Oct 28, 2019
Checklists & Questionnaires

IT Application Security Questionnaire

This sample questionnaire is designed to monitor and enhance an organization's IT application security process.
Subscriber Content
Mon, Aug 19, 2019
Audit Reports

Security Policy and Procedures Evaluation Report: Controls and Responsibility

This sample audit report records the results of a security policies and procedures evaluation. The review illustrates se...
Subscriber Content
Mon, Aug 5, 2019
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Protiviti Booklets

FAQ: Understanding the General Data Protection Regulation

Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Mon, May 13, 2019
Checklists & Questionnaires

IT Employee Termination Checklist

This checklist outlines steps to follow when an IT employee stops working for a company.
Subscriber Content
Mon, Apr 29, 2019