Today On Premium
-
TechRepublic Premium -
TechRepublic Premium Electronic data disposal policy
-
TechRepublic Premium Project management checklist
-
TechRepublic Premium 16 must-read books on the impact of AI, robotics, and automation
Premium Library
-
TechRepublic Premium Access management policy
Without appropriate access management controls, businesses are at significant risk from the loss or theft of both physical and digital assets. Access management controls establish who is allowed the appropriate level of access in order to do their jobs, while reducing the potential for damage or harm to the company. The purpose of this policy ...
-
TechRepublic Premium IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from TechRepublic Premium offers guidelines for governing access to critical systems and confidential data. From the policy: SUMMARY IT ...
-
TechRepublic Premium Windows administrator’s PowerShell script kit
The Windows GUI is the traditional way to perform administrative tasks, but scripting offers faster and more versatile methods that can help further your technical skills. This download includes 21 publicly available PowerShell scripts, along with a document explaining each one, to help you up your scripting game and administer your AD environment more efficiently. ...
-
TechRepublic Premium Scheduled downtime policy
Maintenance tasks, equipment upgrades and installations must be completed regularly — potentially creating disruptions and preventing employees from doing their work. This policy is designed to help your organization determine procedures for scheduling and communicating server, system and network downtime with the goal of minimizing the impact and inconvenience for your staff, clients and contractors. ...
-
TechRepublic Premium Nondisclosure policy
This policy outlines the measures the organization is taking to ensure protection of its confidential information, including the imposition of a contractual obligation in the form of a nondisclosure agreement. From the policy: SUMMARY A nondisclosure policy protects an organization’s confidential information from exposure to persons outside or inside the organization who could intentionally or ...
-
TechRepublic Premium Choosing a payroll service: A guide for business leaders
For businesses, hiring a service to handle all of the necessary payroll calculation, processing, and documentation saves valuable time and resources better spent on running the business. This guide explains the features you should look for in a payroll service and provides a framework you can use when comparing potential services. From the guide: Regardless ...
-
TechRepublic Premium Glossary of useful LVM and related commands
LVM, or Logical Volume Manager, is a feature in Linux which allows on-the-fly management of disk volumes and filesystems. Much more reliable than traditional pre-LVM methods of disk partitioning and formatting, LVM is flexible and can quickly aid in displaying disk and volume information as well as adding, changing or removing disks. With this glossary ...
-
TechRepublic Premium System monitoring policy
This policy defines what systems and services to monitor, establishes how they will be monitored, and determines how support staff will be notified of problems that require escalation or remediation. From the policy: SUMMARY Maximum uptime is often a priority goal for company systems and services in today’s 24/7 year-round society. With that objective in ...
-
TechRepublic Premium Hardware inventory policy
This policy describes guidelines your organization can follow to track, process and decommission IT equipment. From the policy: SUMMARY An organization’s IT hardware inventory constitutes a significant capital investment in order to perform company operations. Because hardware represents a critical asset and often holds organizational data, it is important for the company to track each ...
-
TechRepublic Premium Malware response checklist
Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is to be minimized. Because even the best protected networks become infected, all organizations must have ...
Upcoming Downloads
- Hiring Kit: Human resource specialist
- Hiring Kit: Computer Forensic Analyst
- Hiring Kit: Blockchain Engineer