Checklist: Securing Windows 10 Systems

Every operating system should be appropriately secured, especially end-user workstations, which often contain or permit access to company data and upon which most employee job duties are based. Here is a checklist, created by Scott Matteson for TechRepublic Premium, for getting the maximum security protection out of your Windows 10 deployments. Featured text from the …

Internet and Email Usage Policy

Internet use in the course of conducting business is a foregone conclusion. For most industries, lacking access is an encumbrance, at best, to getting things done. However, significant risk accompanies internet access, such as viruses, ransomware, and data theft, all of which result from unsafe practices. This customizable policy, written by Scott Matteson for TechRepublic …