Need Help? Call 1-866-711-5837

IT Security Guide

The IT Security Guide  comes with the Computer and IT Policies and Procedures Manual, it is vital for any organization today. IT security is all about securing and protecting your IT assets and information is likely your most prized asset. IT is pretty much a commodity these days, but your information is your business. Failure to secure information could have legal, economic or physical ramifications for your organization. It covers the following:

WHY INFORMATION SECURITY?

  • A Brief History of Information Security
  • What Is At Risk?
  • Why Company Executives Should Read These Guidelines
  • A Final Word on Considering IT Security Issues
  • Introductory Security Checklist
Computer IT Security

Download IT Policies and Procedures Manual Templates in editable Word files.

ASSESSING YOUR NEEDS

  • Introduction to Risk Assessment
  • Commonly Asked Questions
  • Components of Risk
  • Dealing with Risk
  • Guidelines for Risk Assessment
  • Closing Thoughts on Risk Assessment
  • Risk Assessment Checklist

SECURITY POLICY: DEVELOPMENT AND IMPLEMENTATION

  • Why Do You Need a Security Policy?
  • Commonly Asked Questions
  • How to Develop Policy
  • From Board Room to Break Room: Implementing Security Policy
  • Closing Thoughts on Policy
  • Policy Development and Implementation Checklist

INFORMATION SECURITY MANAGEMENT

  • Introduction to Security Management
  • Commonly Asked Questions
  • Nurturing Support within the Organization
  • Planning for the Unexpected
  • Testing and Review
  • Implementation and Day-to-Day Maintenance
  • IT Security Management Checklist

PROTECTING YOUR SYSTEM: PHYSICAL SECURITY

  • Introduction to Physical Security
  • Commonly Asked Questions
  • Policy Issues
  • Physical Security Checklist

PROTECTING YOUR SYSTEM: INFORMATION SECURITY

  • Introduction to Information Security
  • Commonly Asked Questions
  • Policy Issues
  • Information Threats
  • Information Security Countermeasures
  • Information Security Checklist

PROTECTING YOUR SYSTEM: INFORMATION SECURITY

  • Introduction to Software Security
  • Commonly Asked Questions
  • Policy Issues
  • Software Threats (Examples)
  • Software Security Countermeasures
  • Software Security Checklist

PROTECTING YOUR SYSTEM: USER ACCESS SECURITY

  • Introduction to User Access Security
  • Commonly Asked Questions
  • Policy Issues
  • User Access Threats (Examples)
  • User Access Security Countermeasures
  • User Access Security Checklist

PROTECTING YOUR SYSTEM: NETWORK (INTERNET) SECURITY

  • Introduction to Network Security
  • Commonly Asked Questions
  • Policy Issues
  • Network Threats (Examples)
  • Network Security Countermeasures
  • Closing Thoughts on Network Security
  • Network Security Checklist

TRAINING: A NECESSARY INVESTMENT IN PEOPLE

  • Introduction to Training
  • Commonly Asked Questions
  • Targeting Training Efforts
  • How Does Security Affect the Workplace?
  • Training Goals
  • A Sample Training Outline
  • Training Frequency
  • Closing Thoughts on Security Training
  • Security Training Checklist
  • Reference Materials