Employee termination policy

PURPOSE This policy provides termination guidelines, including the process of disabling former employee access, reclaiming company equipment and finalizing payroll/benefits details. It complements our Employee termination checklist, which should... Read more »

New Hiatus malware campaign targets routers

A new malware dubbed HiatusRAT infects routers to spy on its targets, mostly in Europe and in the U.S. Learn which router models are primarily targeted and how to... Read more »

How internet-facing webcams could put your organization at risk

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. The post How internet-facing webcams... Read more »

SYS01 stealer targets Facebook business accounts and browser credentials

The SYS01 infection chain uses DLL sideloading to steal information. Learn how to protect your business from this cybersecurity threat. The post SYS01 stealer targets Facebook business accounts and... Read more »

Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

C-Suites executives have cybersecurity insecurities around cloud development, deployment and visibility, a Palo Alto Networks survey finds. The post Cloud security, hampered by proliferation of tools, has a “forest... Read more »

GitHub rolling out two-factor authentication to millions of users

Over the next nine months, the largest internet hosting service for software development and collaboration will make all code contributors add another layer of electronic evidence to their accounts.... Read more »

Remote access policy

PURPOSE This policy outlines guidelines and processes for requesting, obtaining, using and terminating remote access to organization networks, systems and data. It applies to scenarios where employees connect remotely... Read more »

Risk management policy

SUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing... Read more »

Become your business’s cybersecurity expert

Learn a wide variety of topics for a lifetime with this eclectic bundle. The post Become your business’s cybersecurity expert appeared first on TechRepublic. Read more »

Security incident response policy

The Security Incident Response Policy, from TechRepublic Premium, describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident. From the policy: Whenever a... Read more »
Subscribe to our Newsletter