Strengthen Network Security with Software Installation Rules

John Storts
Slide Show

10-Step Security and Vulnerability Assessment Plan

Use this plan to ensure your information system controls are correctly implemented.

As an IT manager, you want to try to accommodate users' needs when it comes to allowing them to install work-related software on their computers and other devices. But, as Knowledge Network contributor Info-Tech Research Group points out in its Software Installation Policy, "certain types of software can open significant security holes in the enterprise network."


On top of security issues, legal issues surround using unlicensed or pirated software, and quality issues can arise when employees use unsupported programs. Put a software policy in place to make sure workers only use software that is licensed, supported and sanctioned by your IT department.


More Security Policies from the Knowledge Network

Network Security Policy for Portable Computers
Security of Information Technology Resources Policy
Software Development Policy Template

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.