Acceptable Use Policy
IT Courses

To outline the acceptable use of computer equipment at Connext Global Solutions. These rules are in place to protect the employee, and Connext Global Solutions. Inappropriate use exposes Connext Global Solutions to risks including virus attacks, compromise of network systems and services, and legal issues.

Connext Email Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Email Retention Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Identifying and Preventing Phishing Threats
IT Courses
Course Type: Policy

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Equipment Disposal Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Removable Media Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Remote Access and Virtual Network Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Physical IT Equipment Security Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

User ID and Password Policy
IT Courses

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.