|
The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on the...
|
|
|
The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...
|
|
|
Use this tool to help you organize and prioritize your current security governance and management challenges.
|
|
|
Use this check list to assess your CMM level based on ISO 27001:2013.
|
|
|
Use this catalog template to create a formal list of information security services offered and service level agreements.
|
|
|
This template will help you organize your various security communication efforts with different stakeholders.
|
|
|
Use this template to define a specific process for managing information security incidents to minimize their impact on the organization.
|
|
|
​I recently had the opportunity to listen and talk with many of the national leaders in defense, intelligence, and security, from the US and several of its key allies and...
|
|
|
Most informed telecoms engineers (and technically sophisticated Net users) have come to the conclusion that security on the Internet, as it's designed today, ranges from...
|
|
|
Use this tool to allow you to determine your organization's specific appropriateness for having a security awareness and training program.
|
|