General

Profile

dewi IT

  • Login: dewi
  • Registered on: 05/29/2020
  • Last connection: 04/26/2024

Issues

open closed Total
Assigned issues 0 0 0
Reported issues 0 0 0

Projects

Project Roles Registered on
IT Policy, Standards & Guidelines Manager 06/03/2020
Data Storage Policy and Guidelines Manager 06/03/2020
E-Mail Setup Guideline Manager 06/03/2020
PDAs and Other Mobile Devices Policy Manager 06/03/2020
Privacy Policy Manager 09/04/2020
Tuntex File Server Storage, Backup & Recovery Manager 06/03/2020
TUNTEX Wi-Fi Policy & Disclaimer Manager 06/03/2020
TUNTEX SYS IT SERVICE DESK Manager 06/03/2020
Tuntex SYS Internet Policy Manager 06/03/2020

Activity

04/26/2024

03:23 PM Identity and Access Management Policy ITP_SYS014_Identity and Access Management Policy.pdf

identity-and-access-management-policy

dewi IT

04/25/2024

03:37 PM Threat and Vulnerability Management Policy ITP_SYS013_Threat and Vulnerability Management Policy .pdf

ITP_SYS013_Threat and Vulnerability Management Policy

dewi IT
06:48 AM Information Technology Incident Management Policy ITP_SYS012_Incident_Management_Policy.pdf

Incident Management Policy

dewi IT

07/08/2021

11:19 AM TUNTEX SYS IT SERVICE DESK What is extortionware?

Extortionware is the latest stage in the evolution of ransomware. No longer content with simply encrypting a victim’s...

dewi IT

02/10/2021

10:00 AM TUNTEX SYS IT SERVICE DESK How a VPN (Virtual Private Network) Works

How Virtual Private Networks Work

A VPN connection to a business's main office can help its employees be productiv...

dewi IT

08/27/2020

10:21 AM IT Policy, Standards & Guidelines ITG_SYS003_Spam Mitigating Guidelines and Best Practices.pdf

spam_guideline

dewi IT
10:21 AM IT Policy, Standards & Guidelines ITG_SYS002_TuntexCloud_Guideline.pdf

tuntex_cloud_guideline

dewi IT
10:20 AM IT Policy, Standards & Guidelines ITG_SYS001_Penggantian_Password_Guideline.pdf

change_pass_guidelines

dewi IT

06/03/2020

09:08 AM Tuntex SYS Internet Policy SOCIAL ENGINEERING

Social Engineering Attacks

Examples of social engineering range from phishing attacks where victims are tric...

dewi IT
09:07 AM Tuntex SYS Internet Policy What’s the Diff: VMs vs Containers

Both VMs and containers can help get the most out of available computer hardware and software resources. Containers a...

dewi IT

Also available in: Atom