The following 183 items are listed by Content Data.
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Policies & Procedures
Data Security Policy
Download the best-practice procedures in this policy, including classification, encryption, access control and secure st...
Policies & Procedures
Remote Network Access Policy
This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Guides
IT General Controls Guide
Use the automation and standardization best practices in this guide to enhance IT processes and improve compliance.
Subscriber Content
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
This comprehensive tool includes two sample IT disaster recovery plan checklists with best-practice questions for pre-pl...
Subscriber Content
Audit Programs
IT Application Management Audit Work Program
Enhance your IT application management audit capabilities with our comprehensive work program, tailored for risk assessm...
Subscriber Content
Policies & Procedures
Patient Admission Policy
Learn about our Patient Admission Policy and insurance benefits verification process for a streamlined and efficient exp...
Subscriber Content
Blog
Internal Audit Best Practices
Internal auditors help protect organizational assets and reputations and improve business operational outco...
Guides
IT Compliance Guide
Use the real-world techniques and receive usable templates in this guide to manage and execute your IT compliance initia...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Blog
New Content on KnowledgeLeader - 5/27/2024
ToolsThe following tools were published on KnowledgeLeader this week:IT Disaster Recovery Plan Assessm...
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Subscriber Content