The following 184 items are listed by Content Data.
Policies & Procedures
IT Personnel Security Policy
Define standards and procedures for maintaining a secure operational environment, safeguarding company assets and promot...
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Policies & Procedures
User Information Security Policy
Maintain the security and integrity of your organization’s information systems with this sample user information securit...
Audit Reports
Identity Access Management Report
Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Articles
Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”
What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Audit Programs
EDI Audit Work Program
Explore our EDI Audit Work Program to master the setup, testing and oversight of secure data exchanges between clients a...
Policies & Procedures
System, Database and Application Administrator Policy
Define the roles, activities and responsibilities of administrators regarding access rights to applications running on c...
Checklists & Questionnaires
System Implementation Process Questionnaire
Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.