SANS Policy Templates: Pandemic and Business Continuity Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for a pandemic response and […]

SANS Policy Templates: Disaster Recovery

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for disaster recovery planning. Disaster […]

SANS Policy Templates: Digital Signature Acceptance Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for digital signature acceptance as […]

SANS Policy Templates: Clean Desk Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing […]

Recover From Disaster Before it Strikes

Having a major incident is something no one looks forward to. But, not looking forward to, and intentionally avoiding discussing it are two entirely different things, and the key to recovering from a disaster is to have the discussions and implement the plans that arise from them today. Everyone hopes that it won’t happen to them, but […]

Putting the Risks of Data Loss and Business Downtime in Dollar Figures

While more and more companies are investing in disaster recovery and preparedness, there are still many remaining that have yet to follow suit. All organizations, no matter how big or small, should have a data backup and recovery plan. The problem is that some businesses don’t think it’s worth it to invest money into disaster […]

Protecting Your Data One Security Feature at a Time

Expensive server equipment and vital internet-related software are the life-support for your entire operation. Together they house essential and virtually priceless data. Securing this critical data is a full-time job. While protecting millions of dollars worth of server hardware is a natural inclination, most companies fall short when it comes to security. Between theft, natural […]

Picking out an Email Scam

With new technology comes new ways that crooks will find to exploit the unwary. Just because your email is private to you does not mean that it cannot be used against you in a thief’s struggle to take advantage.  Though the techniques of email scammers will continue to evolve as individual security measures and caution […]

Personalized Server Hosting Free of Risky Business

Large server hosting data centers are trying to market their services to everyone, but this comes at a cost. First of all, by trying to appeal to everyone, they’re mixing risky businesses with safer ones. Second, their solutions are more generalized, resulting in their customer support being less personal. Choosing  personalized server hosting, free from at-risk businesses, […]

Network Security Question: Is Anyone Spying on You?

To run successfully, your business must keep all kinds information from falling into the hands of hackers or your competitors. These include customer credit card numbers, vendor contract details, and the Social Security numbers of your employers. So you take reasonable precautions in ensuring network security by locking up your servers in a special room, shredding any […]