Featured Technology Articles

Latest from TechRepublic Premium

  • TechRepublic Premium

    Power Checklist: Vetting Employees for Security Sensitive Operations

    Most organizations have applications, processes and data that must be kept secure by authorized personnel. Determining the eligibility of individuals to access or administer these components can be a challenge. Whether you need to establish full access permissions to folders for the purpose of backups or you’re responsible for handling data that could adversely affect ...

    Published:  Modified:  Read More
  • TechRepublic Premium

    Third-Party Vendor Policy

    Today, many businesses rely on outside companies, known as third-party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organizations and other external entities. The purpose of this policy from TechRepublic Premium is to provide guidelines for establishing qualified third-party vendors with which to do business and what requirements ...

  • TechRepublic Premium

    EU GDPR Compliance Checklist

    The EU General Data Protection Regulation is a comprehensive set of rules designed to keep the personal data of all EU citizens collected by any organization, enterprise or business safe from unauthorized access or use. The GDPR went into effect on May 25, 2018, and organizations need to comply. Failure to do so, would be ...

    Published:  Modified:  Read More
  • TechRepublic Premium

    Quick Glossary: Smartphones

    Smartphones have become an integral part of modern life ​​providing users with instant access to information and constant connectivity. TechRepublic Premium presents this quick glossary of 43 terms and concepts to help your understanding. From the glossary: IP RATING Short for ingress protection rating, this indicates how resistant a smartphone is to dust and water. ...

Best Business Software