Search results: 102 matching results

Mobile Device Acceptable Use Policy

This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content

End-User Information Security Background Policy

This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content

IT Network Security Scope Memo

The purpose of this memo is to document the assumptions and decision criteria used in scoping the documentation efforts ...
Subscriber Content

Firewall Administration Policy

The purpose of this document is to establish procedures and requirements to ensure the appropriate protection and contin...
Subscriber Content

Network Access Control Devices Policy

The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content

Privacy Program Leading Practices

This tool features several leading practices to consider when establishing a privacy program.
Subscriber Content

Information Security Management System Policy

This policy establishes the scope of a company's information security management system and characterizes the inter...
Subscriber Content

Manage Security and Privacy: Manage Security Configurations RCM

This document outlines risks and controls common to managing security configurations during the security and privacy man...
Subscriber Content

Virus Protection Policy

This tool contains three sample policies that define best-practice guidelines and procedures for protecting company comp...

Hard Times Bring Out the Best in People — Well, Not Always

In this article, Protiviti Senior Managing Director Carol Beaumier explains how lenders can proactively identify potenti...
Subscriber Content

SolarWinds Vulnerability Update – Indicators of Compromise and Recommended Actions

This Flash Report identifies signs of a network compromise and outlines what actions organizations should take to mitiga...
Subscriber Content

2021 IT Audit Benchmarking Survey

Cybersecurity, privacy, data and resilience dominate the top technology challenges for organizations, according to the a...
Subscriber Content

A Look Back at 2020

Audit Analytics shares some of its most popular articles and topics from 2020.
Subscriber Content

Cloud Oversight in Financial Services: Understanding Responsibility and Control

This article explains how internal audit functions can provide ongoing assurance on their institutions’ use of cloud com...
Subscriber Content

Microsoft Discovers Multiple Zero-Day Exploits Being Used to Attack Exchange Servers

This Flash Report recaps Microsoft’s new security updates and outlines four steps organizations should take to prepare f...
Subscriber Content

Virginia Becomes the Second State to Enact Consumer Privacy Law

In this Flash Report, Protiviti cites and summarizes key requirements contained in Virginia’s new Consumer Data Protecti...
Subscriber Content

Tech Can Help Oil and Gas Firms Survive Market Turmoil

Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content

The Top Risks for the Next Decade: A Global Perspective

This issue of Board Perspectives summarizes seven key takeaways from Protiviti’s Executive Perspectives on Top Risks in ...
Subscriber Content