Information Security Policies are a big part of a comprehensive cybersecurity program. This blog has its share security policy content as this is something I was heavily involved with 4 years ago. But this topic is so important to review, especially if you are just...
Security isn’t just a tech issue. If you go into thinking your gear is your security program, you’re leaving yourself open to hurt. Tech toys can’t solve all security problems. A lot of the obvious problems can be mitigated with simple configurations...
The Department of Homeland Security (DHS) defines cybersecurity insurance [1] as guaranteed coverage for a variety of cyber incidents. This topic can go pretty deep but this post will briefly cover cybersecurity insurance basics. The types of cyber incidents this...
It’s always good to keep your door open to constructive criticism when creating documents or anything else for that matter. Sometimes you get amazing feedback and sometimes you just get noise. I’m sure you’ve experienced both ends of the feedback...
If your organization doesn’t have a set of software standards, ask yourself or your IT Managers the following questions to begin documenting: What software is mandatory (business critical or daily driver)? What software is required for a particular job or...
There’s a trend in bringing in outside personnel to assist with documentation efforts. IT departments know they lack proper documentation and lack the time to concentrate efforts on documenting their systems. So it’s understandable to want to hire...
A few months ago I was casually discussing roles of IT personnel with a law enforcement professional. This discussion was rather short as we were only briefly going over the scope of duties. However, the discussion got me thinking about how much security is integrated...
We kicked off the exploring series by taking a look at policies. We started with recognizing policies as a major type of documentation. We moved into the importance of having policies. Then we took a look at how a policy is created and effected. In order to wrap up...
We’ve reviewed policies as a major type of documentation and why having policies are very important. Now, let’s jump into a brief overview of how a policy is created and effected. The IT policy creation process is as follows: Recognize Plan Research Draft...
This site, Davis Tech Media, is owned and operated by Davis Tech Media LLC, a limited liability company headquartered in Florida, USA. Davis Tech Media is a participant in the Amazon Services LLC Associates Program. As Amazon Associates, we earn from qualifying purchases at no additional cost to you. Davis Tech Media will also participate in affiliate programs with Udemy and other sites. Davis Tech Media is compensated for referring traffic and business to these companies.