Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
sample-it-spreadsheets , security

Sample Excel – Qualys Remediation Tracking

July 24, 2015

Free Excel document download Qualys Remediation Tracking  

Img
compliances , health-care-hipaa-hitech-hitech , policies , security

McKesson Information Solutions

July 20, 2015

McKesson produces many Healthcare applications including Series 2000, STAR, Care Manager and Image Manager. There are many more applications in their portfolio, but these are the prime applications that we find at healthcare facilities when we present eTrust Single Sign-on and Admin. Each of these applications incorporates their own...

Img
compliances , policies , security

Sample Word – How does x.509 differ from PGP?

July 18, 2015

Free Word document download How does x.509 differ from PGP?

Img
compliances , security

QualysGuard Assigning Asset Owners

April 8, 2015

All assets must have an owner assigned that is responsible for remediating any vulnerabilities found on the system. In most cases, the owner information is tracked by IPControl. To assign asset owners, click on the Host Assets button in the Tools Pane on the left of the QualysGuard application....

Img
compliances , security

Qualys Remediation Procedures

March 14, 2015

Backround: Qualys provides online asset management and ticketing tools that can be used to track remediation efforts by various internal IT teams to keep IT assets patched and up to date. These procedures apply to all scanning activity, whether it be for SOX, PCI or weekly scans. Qualys remediation...

Img
compliances , security

Qualys Tickets

February 28, 2015

The primary way to track remediation in Qualys is by using it’s built in ticketing system. You can prioritize and fix vulnerabilities using recommended solutions, such as patches and workarounds, which are provided in scan reports. Remediation workflow allows users to manage vulnerabilities through remediation tickets. Each ticket corresponds...

Img
compliances , networking , security

Sample – Network UAT Change Policy

January 29, 2015

Network Services is requiring User Acceptance Testing (UAT) on all high risk/high impact changes and/or changes that will result in a known impact or system degradation. The risk scoring of the change is based on information entered in the change record as well as the Enterprise model used for...

Img
policies , security

Sample Word – Physical Data Center Local Recovery Considerations

January 28, 2015

Free Word document download Physical Data Center Local Recovery Considerations

Img
compliances , security , visio-stencils

How to create Unit Managers in Qualys for Remediation Management

January 26, 2015

Background: In order to remediate vulnerabilities found, all assets must have an identified asset owner who will work to either fix the vulnerabilities or route the issue to someone who will. Persons who will remediate assets are called “Unit Managers.” This document outlines how to setup an individual as...

Img
compliances , security

Qualys Business Units

January 25, 2015

Management and Remediation Introduction Per regulatory compliance, Information Security team conducts periodic vulnerability assessment (VA) scans on all Symantec internal networks. Business units in QualysGuard are used to delegate remediation responsibilities. If you are a business unit manager, please follow these instructions for assistance on managing your business unit....

Img
compliances , security

Sample Word – DBMS Data Security Standard

January 14, 2015

Free Word document download DBMS Data Security Standard

Img
information-rights-management , security

Sample Word – Courion to Remedy Functional Interface Requirements

January 13, 2015

Free Word document download Courion to Remedy Functional Interface Requirements

Img
compliances , information-rights-management , security

Sample Word – IdM Curion Professional Services Design Document

January 12, 2015

Sample Word document download IdM Curion Professional Services Design Document  

Img
policies , security , visio-stencils

Major aspects of Information Protection Requirements

January 8, 2015

There are a number of other potential resources providing additional direction. Overview Data Protection Begins with You Data Security Classifications Securing Your Work Area and Connection Securing Information in a Mobile Environment Electronic Communications and Mail Social Engineering Social Media Reporting Security Incidents Home

Img
compliances , security

Corporate Security – Awareness

January 6, 2015

Protecting customers, clients this overview provides you with the direction you need when it comes to protecting information. This is the basics of the Global Information Security Standards and Policies, and the Enterprise Electronic Communications and Social Media Policies for Corporate which includes: Identifying the purpose of information protection...

Img
compliances , sample-it-spreadsheets , security

Sample Excel – Data Classification Quick Reference

January 2, 2015

Free Excel document download Data Classification Quick Reference  

Img
compliances , sample-it-spreadsheets , security

Sample Excel – Data Classification Quick Reference Matrix

January 1, 2015

Free excel document download Data Classification Quick Reference Matrix  

Img
security

Password Cracking Testing

December 27, 2014

Password cracking is the process of validating password strength through the use of automated password recovery tools that expose either the application of weak cryptographic algorithms, incorrect implementation of cryptographic algorithms, or weak passwords due to human factors. This module should not be confused with password recovery via sniffing...

Img
policies , sample-it-spreadsheets , security

Sample Excel – Guardium Access Monitoring Deployment

December 24, 2014

Free Excel document download Guardium Access Monitoring Deployment www.bestitdocuments.com

Img
data-center-soc-noc , networking , security , visio-stencils

Sample Visio – Bluecoat Proxy Stencils

December 20, 2014

Free Visio document download BlueCoat VisioStencils www.bestitdocuments.com

Img
compliances , security

Enterprise Integration Service Considerations

December 16, 2014

Challenges for your business… How do you guarantee suitable infrastructure at all locations? How do you handle the design, deployment and integration of new technologies into your global network global network? How do manage the deployment of new technology across thousands of miles, customs barriers, language differences and local...

Img
compliances , itil , security

What is key about ITIL and a Life Cycle approach

December 11, 2014

Improved quality, cost, value and effectiveness of IT Improved IT Productivity Improved IT Services Managed expectations Improved Customer Satisfaction Reduce Operating costs Overall: Organizations can clearly align themselves with the business by agreeing on a service portfolio that describes what customers use, in business language. A strategic lifecycle framework...

Img
health-care-hipaa-hitech-hitech , security

Sample – Clinical Vendor Proof of Concept Criteria

December 8, 2014

Understand Clinical workflows Understand the emphasis on Security User enrollment , provisioning / de-provisioning (integration with Active Directory) Password management (self service) Auditing / reporting Flexible and strong two factor authentication Vendor Capacities  Viability (longevity, experience, financials, market standing) Product Ease of use, Ease of maintenance / customer support...

Img
compliances , policies , security

Protecting your Customers Online and Offline

November 20, 2014

Objectives are to: Identify the purpose of importance of information protection for Corporate and customers. Identify the use and purpose of data security classifications. Identify the components of a strong passwords. Identify how to access, store and destroy data properly. Identify the appropriate security management of electronic communications. Recognize...

Img
compliances , sample-it-spreadsheets , security

Sample Excel – Vulnerability Assessment Asset Tags and Group Tracking

November 19, 2014

Free Excel document download Vulnerability Assessment Asset Tags and Group Tracking www.bestitdocuments.com

Img
projects , sample-it-spreadsheets , security

Sample Excel – Security Architecture Resources

November 17, 2014

Free Excel document download Security Architecture Resources www.bestitdocuments.com

Img
compliances , policies , sample-it-spreadsheets , security

Sample Excel – Vulnerability Resources

November 16, 2014

Free Excel document download Vulnerability Resources www.bestitdocuments.com

Img
compliances , health-care-hipaa-hitech-hitech , projects , security

HIPAA Healthcare Vendor Contract Analysis Review Example

November 15, 2014

Review of your IT Systems Contracts, Scope, Service Level Agreements, Business Associate Agreements, And defined SLS and Business Associate Agreements and deliverables; Review of current processes And procedures to support compliance The core fundamentals will be to identify ownership and performance to include: Security patch management Event logging Event...

Img
email , projects , sample-it-spreadsheets , security

Sample Excel – Exchange Upgrade Project Plan

November 14, 2014

Sample Excel documents download Exchange Upgrade Project Plan www.bestitdocuments.com

Img
business , policies , security

Customer and Corporate Information Protection

November 12, 2014

Data Protection Begins with You Don’t use public WIFI without encrypted connections to the Internet Securing Your Work Area and Connection Securing Information in a Mobile Environment Electronic Communications and Mail Social Engineering Don’t irresponsibility use Social Media Reporting Security Incidents if you suspect them www.bestitdocuments.com

Img
compliances , policies , security

Sample – Security Classifications Quick Reference Guide

November 11, 2014

Security Classifications quick reference guides should provide a sample chart breaking down the various data security classifications by definition and examples. Understanding appropriate data security classifications prepares you for applying proper access and encryption controls, record codes and managing the retention schedule per Global Records Management in order to...

Img