
Today On Premium
-
TechRepublic Premium -
TechRepublic Premium Systems downtime expense calculator
-
TechRepublic Premium Power checklist: Local email server-to-cloud migration
-
TechRepublic Premium Vendor management and selection policy
Premium Library
-
TechRepublic Premium Third-party vendor policy
Today, many businesses rely on outside companies, known as third-party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. In these instances, it’s likely third-party vendors might collect, store or refer to confidential or sensitive information regarding the business or its customers. To ensure ...
-
TechRepublic Premium Security awareness and training policy
This policy is designed to help your IT staff guide employees toward understanding and adhering to best security practices that are relevant to their job responsibilities. From the policy: SUMMARY A security policy is only as valuable as the knowledge and efforts of those who adhere to it, whether IT staff or regular users. Understanding ...
-
TechRepublic Premium Technical documentation policy
The importance of quality technical documentation cannot be overstated. Whether using this documentation to educate and inform internal employees, external customers, seasoned technological professionals, technology-averse end users, millennials, the senior population or any kind of target audience, it can make or break your organization. From the policy: Quality, accurate and easy-to-understand technical documentation can help ...
-
TechRepublic Premium OneDrive cloud usage policy
The OneDrive Cloud Usage Policy defines the practices and behaviors organization representatives must follow when using any Microsoft OneDrive cloud file storage account to execute organization services, process organization data, or access or store organization information. Whether organization representatives access OneDrive file storage capabilities using an organization-provided, organization-reimbursed or personal OneDrive account, all representatives must ...
-
TechRepublic Premium Interview questions: Wireless network engineer
This list of potential interview questions are ready-made for your organization’s HR department to use when it’s time to hire a wireless network engineer. Wireless engineers are valued by all types of business, from traditional brick-and-mortar companies moving to more wireless commerce to industry disruptors. Even smaller companies may contract with businesses that provide the ...
-
TechRepublic Premium Internet of Things policy
These guidelines cover the procurement, usage and administration of IoT devices, whether provided by the company or employee owned. From the policy: SUMMARY The Internet of Things refers to network- or internet-connected devices, such as appliances, thermostats, monitors, sensors and portable items, that can measure, store and transmit information. IoT devices may be business oriented, ...
-
TechRepublic Premium Internet and email usage policy
Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware and data theft, all of which result from unsafe practices. In other words, infections can occur just from connecting ...
-
TechRepublic Premium Hiring kit: Principal software engineer
Developing software in a modern business enterprise requires cooperation, collaboration and coordination. Long gone are the days when a single mythical coder can single-handedly develop software applications sophisticated and flexible enough for modern business needs. Successfully managing the development of quality software in such an environment requires a deft touch of experience. This is a ...
-
TechRepublic Premium Extended sick leave policy
It’s an unfortunate event when an employee becomes severely ill and requires an extended sick leave from work, but companies should have a plan in place for these situations. This plan needs to ensure that both the employee and the company have a set of duties and responsibilities and provide a fair arrangement for all ...
-
TechRepublic Premium Email/Instant Message/voicemail retention policy
Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. Server hard drives can fill up, or stolen data (even if outdated) might pose a threat ...
Upcoming Downloads
- Hiring Kit: Human resource specialist
- Hiring Kit: Computer Forensic Analyst
- Hiring Kit: Blockchain Engineer