The following 210 items are listed by Content Data.
Policies & Procedures
User Malicious Software Policy
The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Audit Programs
System Intrusion Audit Work Program
The objective of this audit work program is to evaluate a business’s ability to detect unauthorized system access attemp...
Subscriber Content
Policies & Procedures
Remote Network Access Policy
This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Process Flows
User Access Security Process Flow
This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Policies & Procedures
Security of Data Policy (with UNIX Example)
The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Protiviti Booklets
The Global Privacy and Information Security Landscape: Frequently Asked Questions
This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Blog
How IT Controls Enhance the Value of IT Assets
It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Blog
Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Blog
New Content on KnowledgeLeader - 3/25/2024
ToolsThe following tools were published on KnowledgeLeader this week:IT Data Management PolicyOur IT D...