Mobile device security policy

More and more users are conducting business on mobile devices. This can be due to increases in remote workers, travel, global workforces, or just being on-the-go. This policy provides guidelines for mobile device security needs in order to protect businesses and their employees from security threats.

From the policy

Summary

Mobile devices are commonly used to conduct company business which can render them more susceptible to risk than desktop or even laptop computers. Desktops are routinely stationary devices and laptops are harder to lose than smartphones or tablets, being more sizeable. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops and laptops are just as applicable to mobile devices.

With this in mind, it’s important to establish and follow specific, comprehensive guidelines for securing mobile devices from loss, attack, or misuse.

Purpose

The purpose of this policy is to provide guidelines for mobile device security needs in order to protect businesses and their employees.

This policy can be customized as needed to fit the needs of your organization.

Scope

All employees, whether full-time, part-time, contract workers, consultants, part-time staff, interns and temporary workers and other personnel are covered by this policy. It also applies to all company-owned drone equipment or material related thereto.

Exceptions

There are no exceptions to this policy except where permitted in writing by the HR and IT departments.

Source of article

Continue ReadingMobile device security policy

iCloud vs. OneDrive: Which is best for Mac, iPad and iPhone users? (free PDF)

Smart professionals know—maybe many learned the hard way—never to keep data in a single location. Although the temptation exists—insidiously alluring with its seduction of ease—to simply store files, especially work in progress, on a Mac desktop or in a local documents folder, phones are lost, iPads are stolen and Mac drives can fail. With such events, all locally stored information is lost and, at worst (if you’re not taking advantage of file encryption and device security features), available to unauthorized users.

Apple iCloud and Microsoft OneDrive provide elegant, cost-effective solutions to the problem and help prevent lost data. The question is no longer whether you should be using a cloud file storage solution, but which one. Find out more in this free TechRepublic PDF download.

Source of article

Continue ReadingiCloud vs. OneDrive: Which is best for Mac, iPad and iPhone users? (free PDF)

Checklist: Onboarding and offboarding IT staff

Employees, contractors and even interns come and go. IT departments, of course, are tasked with ensuring the proper accounts, applications, services and permissions are assigned to each user. The process quickly becomes complex, considering the variety of corresponding elements that must be tracked for every onboarding and offboarding. But when enrolling or disabling an IT staff member’s accounts and services, individual required steps become that much more important.

Following a checklist, like the one provided by TechRepublic Premium, or even customizing the checklist for your organization, will ensure a smooth transition when onboarding and offboarding members of your IT staff.

Source of article

Continue ReadingChecklist: Onboarding and offboarding IT staff

Artificial intelligence ethics policy

The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence.

This policy can be customized as needed to fit the needs of your organization.

From the policy:

SUMMARY

The use of artificial intelligence and machine learning is on the rise in many organizations across various fields. Artificial intelligence has the power to help businesses as well as employees by providing greater data insights, better threat protection, more efficient automation and other advances.

However, if misused, artificial intelligence can be a detriment to individuals, organizations, and society overall. For instance, “bots” are now rampant among social media, generating political propaganda or “fake news” intended to adversely impact or unjustly inflate people’s opinions of various political candidates or personalities, thereby lowering the quality of discourse and public faith in reporting institutions.

Therefore, it is imperative to establish moral guidelines and boundaries for the use of artificial intelligence in business.

Source of article

Continue ReadingArtificial intelligence ethics policy

Argon fluoride laser could lead to practical fusion reactors

The US NRL is developing an Argon Fluoride laser that may one day make fusion power a practical by delivering the incredible temperatures required for a self-sustaining fusion reaction, with enough efficiency to make the process worthwhile.

Source of Article

Continue ReadingArgon fluoride laser could lead to practical fusion reactors