Skip to content
No results
  • Security Program
  • Best Practices
  • Latest Data Breaches
  • How-To
  • Security Tools & Solutions
Information Security Program
  • Security Program
  • Best Practices
  • Latest Data Breaches
  • How-To
  • Security Tools & Solutions
Information Security Program
Wireless Access Security Policy
  • Best Practices, Checklist, How-To, Policies & Procedures

Wireless Access Security Policy – Best Practices

Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network. In this article, I will provide security guidance and best practices when deploying or implementing…

Read MoreWireless Access Security Policy – Best Practices
  • Tommy Nguyen
  • January 18, 2019
Online Social Media Policy
  • Best Practices, Compliance Program, Policies & Procedures, Security Program

Online Social Media Policy: Best Practices and Template

What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media policy needs to be developed and should address employees’ use of such networks, including personal…

Read MoreOnline Social Media Policy: Best Practices and Template
  • Tommy Nguyen
  • January 17, 2019
Internet Use Policy
  • Best Practices, Compliance Program, Policies & Procedures, Security Program

Internet Use Policy: Best Practices and Template

This article provides some insights and guidance on the best practices when developing an Internet Use Policy. You can you the information in this article as a template to draft your own version of the policy. Why do employees need…

Read MoreInternet Use Policy: Best Practices and Template
  • Tommy Nguyen
  • January 16, 2019
Acceptable Use Policy Best Practices
  • Best Practices, Policies & Procedures, Security Program

Acceptable Use Policy: Best Practices and Template

An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other electronic resources. The rules, obligations, and standards described in this policy and other policies/procedures should…

Read MoreAcceptable Use Policy: Best Practices and Template
  • Tommy Nguyen
  • January 15, 2019
Access Control Best Practices
  • Best Practices, How-To, Policies & Procedures, Security Program

Access Control Best Practices

Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow system instructions to protect the data. To mitigate these threats, the organization should establish access…

Read MoreAccess Control Best Practices
  • Tommy Nguyen
  • January 14, 2019
Antivirus Policy Best Practices
  • Best Practices, How-To, Policies & Procedures, Security Tools & Solutions

Antivirus Policy and Procedure Best Practices

The primary purpose of the anti-virus solution or software is to guard against malicious software or scripts by blocking or quarantining this software that is identified, and alerting administrators that such action has taken place. The solution would detect and…

Read MoreAntivirus Policy and Procedure Best Practices
  • Tommy Nguyen
  • January 13, 2019
BYOD Security Best Practices
  • Best Practices, How-To, Policies & Procedures, Security Program

Mobile Device or BYOD Security Best Practices

This article will provide some guidance and best practices for the use of, and security for, remote access and mobile device technology (e.g. BYOD) that access critical information systems and sensitive or confidential information assets. Keywords you should know Mobile…

Read MoreMobile Device or BYOD Security Best Practices
  • Tommy Nguyen
  • January 12, 2019
Teleworking Policy Guidance for Healthcare Organizations
  • Best Practices, Compliance Program, Policies & Procedures

Teleworking Policy Guidance for Healthcare Organizations

The goal of this policy is to govern the controls and safeguards implemented for workforce members that are approved for teleworking activities. What should the policy statement say? In the policy statement, state the goals and objectives and setting the…

Read MoreTeleworking Policy Guidance for Healthcare Organizations
  • Tommy Nguyen
  • January 11, 2019
Prev
1 2 3 4 5
Next
  • Contact Us
  • Our Services
  • Privacy Policy
Copyright © 2025 - WordPress Theme by CreativeThemes