Scott Matteson


Scott Matteson is a senior systems administrator and freelance technical writer who also performs consulting work for small organizations. He resides in the Greater Boston area with his wife and three children.

Latest articles from Scott Matteson

  • Tools & Templates

    Secure Browser Usage Policy

    Once a novelty in the dawn of the personal computing era, the web browser is now an indispensable feature of every computer. Most devices depend on the browser for work, recreation and general functio...

    March 31, 2015 by

  • Downloads

    Cloud Data Storage Policy

    The rise of third-party cloud-based file storage applications has brought flexibility and ease of data access to users and businesses alike. Commonly used applications such as Dropbox, OneDrive and Go...

    March 26, 2015 by

  • Tools & Templates

    Penetration Testing and Scanning Policy

    System or network vulnerabilities and security threats can severely impact business operations or even shutter its doors. However, these incidents can be prevented by proactively detecting potential t...

    February 25, 2015 by

  • Research

    IT Security and Privacy: Concerns, initiatives and predictions

    Security and privacy were top issues in 2014, and so Tech Pro Research conducted a survey to find out what companies are planning for 2015. Now more than ever, security and privacy protections are of ...

    February 2, 2015 by

  • Tools & Templates

    Digital Certificate Policy

    A digital certificate is a sort of signature - a fingerprint which identifies a server or website, for instance, so visitors who connect can verify that the target is who it claims to be and not a fra...

    January 30, 2015 by

  • Tools & Templates

    Auditing and Logging Policy

    Many computer systems, network devices and other technological hardware used in the enterprise possess the capability to audit and log various activities. These activities include network traffic, int...

    January 30, 2015 by

  • Research

    Wearables, BYOD and IoT: Current and future plans in the enterprise

    The Bring Your Own Device, also known as BYOD, concept has revolutionized many industries. By allowing employees to bring their own devices into the office for business use it has helped companies cut...

    January 3, 2015 by

  • Tools & Templates

    Equipment Reassignment Policy

    In order to achieve the maximum benefit from company assets it is important to ensure the longest possible lifespan for assigned equipment through proper usage support, maintenance, and reassignment. ...

    December 30, 2014 by

  • Tools & Templates

    Domain Name System (DNS) Policy

    Domain Name System, or DNS, is the veritable backbone of internet communication. It translates computer names into the network (IP) addresses they represent for easy and fault-tolerant access. For ins...

    December 30, 2014 by

  • Research

    Enterprise Startups: Winners, Losers, Potential Shake-ups

    Tech Pro Research conducted a survey in October and November 2014 to look at enterprise startups: which ones are being used or evaluated, why people are behind them (or not), and what their factors fo...

    December 5, 2014 by