Tag: Best Practices
Wireless Access Security Policy – Best Practices
Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network….
Online Social Media Policy: Best Practices and Template
What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media…
Acceptable Use Policy: Best Practices and Template
An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other…
How To Prevent Application Vulnerabilities and Breaches
Any applications developed internally or outsourced should follow secure coding practices to prevent common vulnerabilities and potential data breaches. The application’s design and implementation should…
GDPR Explained In Plain English
What is the GDPR regulation and when did it passed? The EU General Data Protection Regulation, or GDPR for short, is a sweeping regulation passed…
Medical Device Security Best Practices
Medical devices improve health, quality of life, and even save lives. As such, medical device use must be appropriate for the context and setting in…
How To Implement Security Auditing and Logging
Generally accepted security auditing and logging practices should be adhered to ensure that the policies and procedures regarding compliance with the implementation specifications of certain…
An Effective Vendor Management Program
A vendor management program is designed to provide the organization the assurance that vendors, third-party service providers, contractors, and subcontractors are meeting the same standards…