Category: Security | TechRepublic

Secure Equipment Repair Policy and Confidentiality Agreement

Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers and other IT equipment. This policy from TechRepublic Premium ensures that the organization maintains regulatory and best business practice security compliance while tracking systems when they…

How to Create and Use a Docker Secret From a File

Learn how to create and use a Docker secret from a file for secure storage of sensitive data with this step-by-step tutorial. This article has been indexed from Security | TechRepublic Read the original article: How to Create and Use…

Best IT Asset Management Software for 2023

These top IT asset management tools can increase visibility of your IT assets for improved risk reduction. Find out which one is best for your business. This article has been indexed from Security | TechRepublic Read the original article: Best…

Remote Access Checklist

This Remote Access Checklist from TechRepublic Premium should be used to ensure all employees have the requisite items, accounts, access and instructions needed for remote work. It should be filled out by the IT department and signed off on by…

Access Management Policy

Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while…

P2P File Sharing Policy

The purpose of this policy from TechRepublic Premium is to provide guidelines for the proper use of peer-to-peer file sharing. It includes an authorization form for approval of P2P file transmission, which sets the conditions and parameters in which this…