by Roy Davis | Jun 17, 2019 | Documentation |
Information Security Policies are a big part of a comprehensive cybersecurity program. This blog has its share security policy content as this is something I was heavily involved with 4 years ago. But this topic is so important to review, especially if you are just...
by Roy Davis | May 18, 2016 | Security Management |
Security isn't just a tech issue. If you go into thinking your gear is your security program, you're leaving yourself open to hurt. Tech toys can't solve all security problems. A lot of the obvious problems can be mitigated with simple configurations and preventative...
by Roy Davis | Oct 28, 2015 | Documentation |
We kicked off the exploring series by taking a look at policies. We started with recognizing policies as a major type of documentation. We moved into the importance of having policies. Then we took a look at how a policy is created and effected. In order to wrap up...
by Roy Davis | Oct 22, 2015 | Documentation |
We've reviewed policies as a major type of documentation and why having policies are very important. Now, let's jump into a brief overview of how a policy is created and effected. The IT policy creation process is as follows:...
by Roy Davis | Oct 15, 2015 | Documentation |
In last week's post, Exploring 3 Different Types of IT Documentation, we briefly touched on policies as one of the three common types of documentation. The importance of IT policies cannot be overstated. Policies are very important as they portray an organization's...
by Roy Davis | Sep 8, 2015 | BoR News |
Edit 1/16: Ha, I wasn't kidding when I said this would be more than just another tech blog. This Best of Roy blog, the Tactful Tech blog, the Roy Can Fix It blog, and the old Bit Expanse blog have merged. Therefore, this post is no longer the inaugural post on this...