Category: New Downloads

Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary cost to the business.

The purpose of this policy is to provide procedures and protocols for supporting effective organizational asset management specifically focused on electronic devices. This policy can be customized as needed to fit the needs of your organization.

From the policy

SCOPE

All employees, whether full-time, part-time, contract workers, consultants, part-time staff, interns and temporary workers and other personnel are covered by this policy. It also applies to all company-owned equipment, employee-owned equipment used to conduct company business or material related thereto.

EXCEPTIONS

There are no exceptions to this policy except where permitted in writing by the HR and IT departments.

Downloads on TechRepublic

Provide fast and efficient services to your organization with SolarWinds Service Desk. With SolarWinds Service Desk, you can:

  • Quickly manage tickets submitted via email, phone calls, service portal, and walk-ups
  • Keep track of your assets to ensure employees are equipped with the tools they need to get their work done
  • Use automated workflows to do less of the mundane, simple tasks and more impactful projects

Downloads on TechRepublic

Provide fast and efficient services to your organization with SolarWinds Service Desk. With SolarWinds Service Desk, you can:

  • Quickly manage tickets submitted via email, phone calls, service portal, and walk-ups
  • Keep track of your assets to ensure employees are equipped with the tools they need to get their work done
  • Use automated workflows to do less of the mundane, simple tasks and more impactful projects

Downloads on TechRepublic

Provide fast and efficient services to your organization with SolarWinds Service Desk. With SolarWinds Service Desk, you can:

Provide fast and efficient services to your organization with SolarWinds Service Desk. With SolarWinds Service Desk, you can:

Provide fast and efficient services to your organization with SolarWinds Service Desk. With SolarWinds Service Desk, you can:

A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other encryption systems to protect sensitive data. It can be a difficult position to fill. Using this hiring kit as a template you can find, recruit, and hire the best cryptographer candidate for your business.

Depending on the open position, job responsibilities for a cryptographer can include the design and implementation of encryption systems and/ or the testing of such systems to find and identify security vulnerabilities. The Hiring Kit: Cryptographer includes a detailed job description, suggested interview questions, and a sample want ad that you can use as a template to find, recruit, and hire the best cryptographer candidate for your business.

From the hiring kit

INTRODUCTION

In the modern digital era, where businesses experience constant and persistent attacks on their information technology infrastructure from malicious and criminal third parties, data security must be a vital part of any enterprise security strategy. The attachment of substantial financial consequences for security breaches and data loss by regulatory agencies only increases that urgency. Businesses are expected to take every security step possible to ensure the integrity of any and all collected, stored, and processed data.

In many instances, one of those expected security steps will include the hiring of a cryptographer. In general terms, a cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other systems to encrypt, and thus protect, sensitive data. The cryptographer skillset combines aspects of computer science, applied mathematics, engineering, and application development. Finding individuals with the prerequisite skills can greatly complicate the recruitment and hiring process for many businesses.

Downloads on TechRepublic

Successfully finding and recruiting suitable candidates for Security Analyst requires a well thought out plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Security Analyst in your organization.

From the hiring kit

INTRODUCTION

For most modern business enterprises, the collection, processing, and storage of data is the driving force behind every transaction, decision, and strategy. In a business era where everyone and everything is networked and connected, data is the most valuable commodity. Therefore, it is extremely vital that every business take necessary precautions to protect their data from unauthorized access, particularly if such access is made by individuals with malicious intent.

Malicious criminals continue to plague the business world with constant, and all too often successful, attacks on IT infrastructure. So, in a regulatory and compliance environment where failing to protect sensitive or private data can result in costly fines and penalties, it is time for businesses to take a much more proactive approach to their data security protocols, policies, and procedures.

Hiring a dedicated security analyst to take control of your enterprise’s IT security strategy, implementation, and testing is a good place to start. In general, security analysts are tasked with identifying weaknesses in current security systems and developing solutions to close security vulnerabilities. To perform this task well, ideal candidates will have highly advanced technical skills, a proven ability to communicate with all levels of an organization, and experience applying both skillsets to solve real problems.

Downloads on TechRepublic

Recruiting candidates with advanced software engineering experience and a least some familiarity with applied blockchain technology will take time and effort. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Blockchain Engineer in your organization.

From the Hiring kit

INTRODUCTION

Moving well-beyond its cryptocurrency roots, blockchain technology has quickly become a sought-after component of application development in the modern business enterprise. Unlike public blockchain applications like cryptocurrency, however, permissioned blockchain applications can be used to secure transactions and automate access control for a variety of business activities across many industries.

Because of its status as a relatively new technology, employers cannot expect to hire blockchain engineers with significant experience in the development of practical blockchain business applications. The more realistic approach is to search for candidates with advanced software engineering experience and a least some familiarity or experience with applied blockchain technology. However, because of the emerging state of the technology, and regardless of previous experience, any newly hired blockchain engineer must also be able to learn and develop additional skills through on-the-job training.

Downloads on TechRepublic

Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of multiple streams of income to provide for themselves and their families.

Working multiple jobs does not in itself pose a risk to either the employee’s primary organization or the employee’s occupation therein, but there are certain requirements which must be established and fully met to ensure the conditions under which an employee moonlights are fair for both themselves and the organization.

The purpose of this policy is to provide guidelines for permissible employee moonlighting practices to establish expectations for both workers and organizations.
This policy can be customized as needed to fit the needs of your organization.

From the policy

SCOPE

All employees, whether full-time, part-time, contract workers, consultants, part-time staff, interns and temporary workers and other personnel are covered by this policy. It also applies to all company-owned equipment or material related thereto.

EXCEPTIONS

There are no exceptions to this policy except where permitted in writing by the HR and IT departments.

Downloads on TechRepublic