vivitec
  • SECURITY SERVICES
  • TECHNOLOGY SERVICES
  • WHO WE ARE
    • LOCATIONS
  • CAREERS
  • RESOURCES
  • Let’s Talk
Select Page
  • Cybersecurity
    • Blogs
    • Policies Guidelines & Compliance
    • White Papers
    • Webinars
  • Technology Services
    • Policies Guidelines & Compliance
    • White Papers
  • Remote
    • Blogs
    • Policies Guidelines & Compliance
    • White Papers
  • IT Compliance
    • Policies Guidelines & Compliance
    • White Papers
  • Phishing
    • White Papers
  • Disaster Recovery
    • Policies Guidelines & Compliance
Under Attack – The Global Year In Breach

Under Attack – The Global Year In Breach

White Papers, White Papers, Cybersecurity, IT Compliance

No matter which metrics you analyze, 2019 was a devastating time for data security. The year was a continuation of a disturbing trend that has produced ominous results in four key categories: cost, size, impact, and time. For instance, according to the Ponemon...

read more
The State of the Dark Web e-book

The State of the Dark Web e-book

White Papers, White Papers, Cybersecurity, IT Compliance

COVID-19 has affected every corner of the world - including the Dark Web. As we’ve monitored and analyzed the Dark Web in 2020, we’ve discovered trends that point to today’s biggest cybersecurity threats and gained insight into the risks of tomorrow.[pdf...

read more
Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP)

Policies Guidelines & Compliance, Policies Guidelines & Compliance, IT Compliance, IT Services

The purpose of this policy is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network systems...

read more
Email Policy

Email Policy

Policies Guidelines & Compliance, Policies Guidelines & Compliance, IT Compliance, IT Services

The purpose of this email policy is to ensure the proper use of your company's email system and make users aware of what your company deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within...

read more
Pandemic Response Planning Policy

Pandemic Response Planning Policy

Policies Guidelines & Compliance, IT Compliance

This document directs the planning, preparation, and exercises for pandemic disease outbreak over and above the normal business continuity and disaster recovery planning process. The objective is to address the reality that pandemic events can create personnel and...

read more
Password Protection Policy

Password Protection Policy

Policies Guidelines & Compliance, Policies Guidelines & Compliance, IT Compliance, Remote Workers

The purpose of this policy is to establish a standard for strong password creation and protection.Disclaimer: This is not a legal document. The intent is to be used as sample/foundation policy for small businesses. Every company should consult with legal...

read more
Security Response Plan Policy

Security Response Plan Policy

Policies Guidelines & Compliance, Policies Guidelines & Compliance, Cybersecurity, IT Compliance

The purpose of this policy is to establish the requirement that all business units supported by your company security team develop and maintain an SRP. This ensures that the security incident management team has all the necessary information to formulate a successful...

read more
Remote Workforce Security Policy

Remote Workforce Security Policy

Policies Guidelines & Compliance, Policies Guidelines & Compliance, IT Compliance, Remote Workers

This document directs the planning, preparation, and exercises for pandemic disease outbreak over and above the normal business Working remotely is rapidly becoming a new standard operating procedure, which is why we’ve put together a list of 21 best practices to help...

read more

Client Remote Support

  • SECURITY SERVICES
  • TECHNOLOGY SERVICES
  • WHO WE ARE
  • CAREERS
  • RESOURCES
  • Let’s Talk
  • Facebook
  • LinkedIn
Kentucky Office - 859.414.6115 | 2890 Chancellor Drive Crestview Hills, KY 41017 | Ohio Office - 513.400.5725 | Florida Office - 239.315.7871 | Austin, TX Office - 512.368.9292
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT