Category: Security | TechRepublic

IT Staff Systems and Data Access Policy

IT professionals, such as system and network administrators, help desk staff, management personnel and sometimes external vendor representatives, are routinely provided full access to company servers, network devices and data so that they can effectively perform their jobs. This policy…

Microsoft, Apple versus China, spyware actors

It’s a cat-and-mouse struggle as tech giants Microsoft and Apple deal with persistent threats from China state actors and Pegasus spyware. This article has been indexed from Security | TechRepublic Read the original article: Microsoft, Apple versus China, spyware actors

Vendor Comparison: DIY Home Security Systems

When it comes to DIY home security, there are many systems and components to consider and many decisions to make. This vendor comparison guide from TechRepublic Premium provides advice you can follow as you make decisions regarding how you will…

Securing Linux Policy

Linux is a powerful and customizable operating system that has been the backbone of many businesses for decades. This policy from TechRepublic Premium provides guidelines for securing Linux on company computers and computers used to conduct company business. It assumes…