Files vs Piles

Written by Cynthia Kyriazis


Continued from page 1

Technology torepparttar rescue

There are at least two software products inrepparttar 140737 marketplace that help employees retrieve information stored within their own workspace. The programs aren't particularly complicated or expensive however they take time to set up. But let's face it--a workspace in disarray didn't get that way overnight. Sorepparttar 140738 'fix' most likely won't happen that quickly either. After investingrepparttar 140739 required time, management and maintenance ofrepparttar 140740 system tends to be easy and painless. Andrepparttar 140741 productivity gain enormous.

As Neil Larson said…'the value of information lies in how it is organized.' Can you find your organization's valuable information quickly? Copyright  2001 Cynthia Kyriazis. All rights reserved.

Cynthia Kyriazis is an organizing and time management performance consultant, trainer, coach, speaker and author. She is President of Organize it, Inc.


Protect Your Computer System With A Comprehensive Security Policy

Written by Cavyl Stewart


Continued from page 1

Make presenting your Security Policy part of your new employee orientation procedure. Make sure every employee readsrepparttar policy, signs and dates a document certifying that it has been read, and then keeprepparttar 140668 signed and dated certification in their respective personnel folder. And every time that your Security Policy is updated, make every employee read it again, and sign and date a document stating that they have readrepparttar 140669 changes.

The types of topics you may want to cover in your company’s Security Policy include but are not limited to:

* What can be loaded onto an employee’s computer from floppy disk or CD

* What personal business, if any, can be conducted onrepparttar 140670 company computer

* Which files or company information is allowed to leaverepparttar 140671 internal network or is allowed to be sent out overrepparttar 140672 Internet

* Who is allowed to install new software and software upgrades ontorepparttar 140673 system, and equally important, who is not allowed to do this

* A password management and password change policy which includes repparttar 140674 acceptable length of passwords. Provide examples of permissible/non-permissible passwords. Examples of non-permissible passwords might include date of birth, names of pets, nicknames, children’s names, etc.

* Who’s allowed remote access to your network from off-site

* Policies for locking keyboard or using password protected screensavers when an employee’s PC is left unattended

* Who is allowed to attach their laptop or other portable computing device torepparttar 140675 network and what information they are allowed to upload/download

* Guidelines for vendors and other visitors who may need access to your network while they are on-site.

Whether you have one PC or several networked together, you have a lot of money invested. Protect this critical business asset with an iron-clad Security Policy.

Cavyl Stewart is the author of "135 Hot Tech Tips for Small Business Owners." To Download your free copy, just visit: http://www.find-small-business-software.com/135_tips.php


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use