Third party access
Contractors, suppliers and other 3rd party vendors are tracked and monitored when using the organisation’s systems to prevent any unauthorised transfer of sensitive data
Showing 1–12 of 15 results
-
Best Practices for Cyber Resilience
$75.00 Add to cart -
Cyber Health Check Questionnaire
$75.00 Add to cart -
Cyber Security Guidance for Small Business
$250.00 Add to cart -
Cyber/Information Security Self-Assessment
$75.00 Add to cart -
Data Security Vendor DD
$50.00 Add to cart -
Guide to Creating Strong and Safe Passwords
$30.00 Add to cart -
Guidelines for Information Security
$250.00 Add to cart -
ICT General Controls Assessment
$75.00 Add to cart -
IT Supplier Evaluation Matrix
$50.00 Add to cart -
Matrix for Information Security Risk Assessment
$150.00 Add to cart -
Policy and Procedure for ICT Access Control
$75.00 Add to cart -
Policy and Procedures for ICT Identity and Access Management
$75.00 Add to cart
Showing 1–12 of 15 results