All
All

Network Security Policy for Portable Computers

141 KB | 3 files |  DOC, PDF

Make sure that your network security plans include steps to protect the network from infected laptops. Effective security always starts with a sound and comprehensive policy.

There is a big hole in your corporate antivirus efforts. Unfortunately, the CEO is carrying it in a briefcase on that infected laptop computer he or she takes home every night. Make sure that your network security plans include steps to protect the network from infected laptops. Effective security always starts with a sound and comprehensive policy. Use this editable network security policy for portable computers to prevent your company's laptops from being mobile Trojan horses.

The policy includes:

  • Requirements for gaining access to the corporate network
  • User responsibilities
  • IT department audit information

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Network Security Policy for Portable Computers.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.

All IT Downloads from Info-Tech Research Group» | Visit Info-Tech Research Group »

Related IT Downloads

Tablet Windows 8 for Dummies

In this excerpt, you'll learn about the two Windows control panels, how to alter the appearance of Windows 8, and install or remove apps and programs. ...  More >>

Microsoft OneNote 2010 Reference Guide Microsoft OneNote 2010 Reference Guide

The at-a-glance guide from CustomGuide teaches you basics of working with OneNote's Ribbon interface, Backstage view features and Web sharing....  More >>

BIOS Integrity Measurement Guidelines BIOS Integrity Measurement Guidelines

Measure and monitor the integrity of the BIOS in your workstations so that you can detect BIOS code and configuration changes and prevent costly attacks....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data