Our documents are based on successfully executed projects which save you time and money.
compliances

Sample Word – Student and Parent Laptop Agreement

March 20, 2015

Sample Word Document download Student and Parent Laptop Agreement  

Tags: , Img
compliances , security

Qualys Remediation Procedures

March 14, 2015

Backround: Qualys provides online asset management and ticketing tools that can be used to track remediation efforts by various internal IT teams to keep IT assets patched and up to date. These procedures apply to all scanning activity, whether it be for SOX, PCI or weekly scans. Qualys remediation...

Tags: , Img
policies

Sample Word – Harvest Service Desk Integration with Clarity document

March 12, 2015

Free MS Word document download Harvest Service Desk Integration with Clarity document

Tags: , Img
data-center-soc-noc , visio-stencils

Sample Visio – New Office Build out considerations

March 6, 2015

Free Visio Document download New Office Build Out  

Tags: , , Img
application , visio-stencils

Sample Visio – 14 HCM, HRIS and Great Plains Financial Workflows

March 1, 2015

14 Free Visio HCM, HRIS and Great Plains Financial Workflows document downloads. HCM_Accounting.zip PLR-Day5A-5B.vsd Technical Accounting Day Minus 4.vsd Technical Accounting Day Minus 4a.vsd Technical Accounting Day-10 – 14.vsd Technical Accounting Day-13.vsd Technical Accounting Day-15.vsd Technical Accounting Day-2.vsd Technical Accounting Day-3.vsd Technical Accounting Day-4.vsd Technical Accounting Day-5.vsd Technical Accounting...

Tags: , , Img
compliances , security

Qualys Tickets

February 28, 2015

The primary way to track remediation in Qualys is by using it’s built in ticketing system. You can prioritize and fix vulnerabilities using recommended solutions, such as patches and workarounds, which are provided in scan reports. Remediation workflow allows users to manage vulnerabilities through remediation tickets. Each ticket corresponds...

Tags: , Img
compliances

Sample Word – Clarity Integration Implementation Questionnaire Document

February 20, 2015

Free MS Word document download Clarity Service Desk Harvest Implementation Questionnaire.doc  

Tags: , Img
compliances , policies

Sample Word – Employee Internet Usage Policies

February 14, 2015

Sample Word document download Employee Internet Usage Policy

Tags: , Img
compliances , policies

Sample Word – Information Security Policy Statements

February 2, 2015

Free Word Document download Information Security Policy Statement

Tags: , Img
compliances , networking , security

Sample – Network UAT Change Policy

January 29, 2015

Network Services is requiring User Acceptance Testing (UAT) on all high risk/high impact changes and/or changes that will result in a known impact or system degradation. The risk scoring of the change is based on information entered in the change record as well as the Enterprise model used for...

Tags: , , Img
policies , security

Sample Word – Physical Data Center Local Recovery Considerations

January 28, 2015

Free Word document download Physical Data Center Local Recovery Considerations

Tags: , Img
compliances , security , visio-stencils

How to create Unit Managers in Qualys for Remediation Management

January 26, 2015

Background: In order to remediate vulnerabilities found, all assets must have an identified asset owner who will work to either fix the vulnerabilities or route the issue to someone who will. Persons who will remediate assets are called “Unit Managers.” This document outlines how to setup an individual as...

Tags: , Img
compliances , security

Qualys Business Units

January 25, 2015

Management and Remediation Introduction Per regulatory compliance, Information Security team conducts periodic vulnerability assessment (VA) scans on all Symantec internal networks. Business units in QualysGuard are used to delegate remediation responsibilities. If you are a business unit manager, please follow these instructions for assistance on managing your business unit....

Tags: , Img
policies , security , visio-stencils

Major aspects of Information Protection Requirements

January 8, 2015

There are a number of other potential resources providing additional direction. Overview Data Protection Begins with You Data Security Classifications Securing Your Work Area and Connection Securing Information in a Mobile Environment Electronic Communications and Mail Social Engineering Social Media Reporting Security Incidents Home

Tags: , Img
compliances , policies , security

Protecting your Customers Online and Offline

November 20, 2014

Objectives are to: Identify the purpose of importance of information protection for Corporate and customers. Identify the use and purpose of data security classifications. Identify the components of a strong passwords. Identify how to access, store and destroy data properly. Identify the appropriate security management of electronic communications. Recognize...

Tags: , , Img
compliances , sample-it-spreadsheets , security

Sample Excel – Vulnerability Assessment Asset Tags and Group Tracking

November 19, 2014

Free Excel document download Vulnerability Assessment Asset Tags and Group Tracking www.bestitdocuments.com

Tags: , , , Img
compliances , policies , visio-stencils

Sample Visio – Strategic IT Plan Structure

November 18, 2014

Free Visio document download Strategic IT Plan Structure www.bestitdocuments.com

Tags: , , , Img
projects , sample-it-spreadsheets , security

Sample Excel – Security Architecture Resources

November 17, 2014

Free Excel document download Security Architecture Resources www.bestitdocuments.com

Tags: , , , Img
compliances , policies , sample-it-spreadsheets , security

Sample Excel – Vulnerability Resources

November 16, 2014

Free Excel document download Vulnerability Resources www.bestitdocuments.com

Tags: , , , Img
compliances , health-care-hipaa-hitech-hitech , projects , security

HIPAA Healthcare Vendor Contract Analysis Review Example

November 15, 2014

Review of your IT Systems Contracts, Scope, Service Level Agreements, Business Associate Agreements, And defined SLS and Business Associate Agreements and deliverables; Review of current processes And procedures to support compliance The core fundamentals will be to identify ownership and performance to include: Security patch management Event logging Event...

Tags: , , , Img
email , projects , sample-it-spreadsheets , security

Sample Excel – Exchange Upgrade Project Plan

November 14, 2014

Sample Excel documents download Exchange Upgrade Project Plan www.bestitdocuments.com

Tags: , , , Img
business , policies , security

Customer and Corporate Information Protection

November 12, 2014

Data Protection Begins with You Don’t use public WIFI without encrypted connections to the Internet Securing Your Work Area and Connection Securing Information in a Mobile Environment Electronic Communications and Mail Social Engineering Don’t irresponsibility use Social Media Reporting Security Incidents if you suspect them www.bestitdocuments.com

Tags: , , Img
compliances , policies , security

Sample – Security Classifications Quick Reference Guide

November 11, 2014

Security Classifications quick reference guides should provide a sample chart breaking down the various data security classifications by definition and examples. Understanding appropriate data security classifications prepares you for applying proper access and encryption controls, record codes and managing the retention schedule per Global Records Management in order to...

Tags: , , Img
compliances , policies , sample-it-spreadsheets

Sample Word – Software License and Services Agreement

November 10, 2014

Free Word document download Software License and Services Agreement Home

Tags: , , Img
itil , projects , sample-it-spreadsheets

Sample Excel – Weekly Change Management Rule Summary

November 9, 2014

Free Excel document download Weekly Change Management Rule Summary Home

Tags: , , , Img
compliances , sample-it-spreadsheets , security

Sample Excel – SSH References

November 8, 2014

Free Excel document download SSH References www.bestitdocuments.com

Tags: , , , Img
firewalls , projects , security

Sample Word – PGP Deployment Guidelines

November 7, 2014

Free Word document download PGP Deployment Guidelines www.bestitdocuments.com

Tags: , , , Img
sample-it-spreadsheets

Sample Excel – Sample Scan IP Tracking – VA Assessment

November 6, 2014

Free Excel document download Sample Scan IP Tracking www.bestitdocuments.com

Tags: , , , Img
firewalls , sample-it-spreadsheets , security

Sample Excel – VPN Questions

November 5, 2014

Free flow download VPN Questions www.bestitdocuments.com

Tags: , , , Img
health-care-hipaa-hitech-hitech , projects

Sample Word – Imprivata Deployment Guide

November 4, 2014

Free MS Word document download Imprivata Deployment Guide www.bestitdocuments.com

Tags: , , Img
compliances

Technology Standards

November 2, 2014

Each element of the conceptual architecture will be defined by five characteristics: Design Principles that guide decision making Agreed upon Technologies for implementation Adopted Standards within ’s IS organization Agreed upon vendor Products and business relationships Sample Configurations that illustrate the application of the agreed upon architectural principles www.bestitdocuments.com

Tags: , , Img