IT Security

The following 182 items are listed by Content Data.

Checklists & Questionnaires

System Implementation Process Questionnaire

Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Subscriber Content
Mon, Feb 3, 2025
Policies & Procedures

Virus Protection Policy

Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Subscriber Content
Mon, Jan 6, 2025
Policies & Procedures

IT Personnel Security Policy

Define standards and procedures for maintaining a secure operational environment, safeguarding company assets and promot...
Subscriber Content
Mon, Jan 6, 2025
Policies & Procedures

User Information Security Policy

Maintain the security and integrity of your organization’s information systems with this sample user information securit...
Subscriber Content
Mon, Dec 30, 2024
Audit Reports

Identity Access Management Report

Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Subscriber Content
Mon, Dec 16, 2024
Articles

Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”

What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Subscriber Content
Mon, Dec 9, 2024
Audit Programs

EDI Audit Work Program

Explore our EDI Audit Work Program to master the setup, testing and oversight of secure data exchanges between clients a...
Subscriber Content
Mon, Nov 25, 2024
Policies & Procedures

System, Database and Application Administrator Policy

Define the roles, activities and responsibilities of administrators regarding access rights to applications running on c...
Subscriber Content
Mon, Nov 18, 2024
Policies & Procedures

IT System Access and Re-Certification Policy

Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Subscriber Content
Mon, Nov 4, 2024
Audit Programs

System Intrusion Audit Work Program

Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Subscriber Content
Mon, Oct 28, 2024
Policies & Procedures

Server Configuration Policy

Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Subscriber Content
Mon, Oct 14, 2024
Policies & Procedures

Remote Network Access Policy

This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Mon, Aug 19, 2024