White Papers for Federal Information Security Management Act (FISMA)White Papers > FISMA
Listings 71 - 80 of 523:
Balancing Security Against Productivity
What makes for great security? Is it about keeping the bad guys out or letting the good guys in? About defending attacks or preventing them? When IDG Research Services queried IT security pr...
Banking on Confidence: Tripwire helps financial institution achieve regulatory compliance
While governments rally to bring some order to the worldwide economic crisis, customer confidence in the financial industry is waning. That means institutions must be able to prove that they...
Benefits of Using Scotchgard in Home Cleaning Services
Commercial cleaning services are important for proper cleaning of offices and industrial places. They have a growing need in most industries and businesses.
Best Practices for Defining and Establishing Effective Archive Retention Policies
The use of technology as a means of business communication has increased exponentially in recent years. Electronically stored information (ESI) has become a major source of business records,...
Best Practices for Emerging Compliance Challenges: Electronic Messaging & Communications
Information security issues were present even in the days of stage-coach mail delivery, but they were relatively simple to resolve — put an armed guard on top of the stage coach and make tho...
Best Practices for Inbound Email Security
Because email is everywhere, used by everyone, and used for everything, many marketers use email to convince readers to buy their products; or worse, attackers use email to trick readers int...
Best Practices for Managing and Enforcing Security on Your Endpoints
IT Managers have limited resources budgets, yet face a multitude of competing security priorities competing for those dollars. This paper is intended to help decision makers recognize which ...
Best Practices for Managing and Enforcing USB Security: Five Questions You Should Ask About Universal Serial Bus (USB) Security
Many companies live in fear of the day when someone steals their sensitive corporate data. That’s why companies deploy firewalls, manage wireless connectivity, control network-access privile...
Best Practices for Small & Medium Sized Businesses
The tragic events of September 11th and Hurricane Katrina have raised awareness of business continuity and disaster recovery at all businesses. These are extreme examples of threats against ...
Best practices for successfully deploying and managing data encryption on laptops
Data encryption is a "must have" security technology, but it is hard to implement. Here are practical suggestions and best practices on how to select, deploy and manage data encryption softw...
Copyright © 2007-2012 ComplianceHome.com. A SUPREMUS GROUP venture. All rights reserved.