Scott Matteson

Analyst

Scott Matteson is a senior systems administrator and freelance technical writer who also performs consulting work for small organizations. He resides in the Greater Boston area with his wife and three children.

Latest articles from Scott Matteson

  • Tools & Templates

    P2P File Sharing Policy

    Tech Pro Research's P2P File Sharing Policy can help you provide guidelines for the proper use of P2P file sharing.You can download the policy template and use it as is or modify it to suit your needs...

    June 30, 2015 by

  • Tools & Templates

    Change Order Form

    Change is inevitable in any technological sector; it brings new features, functions and opportunities and helps businesses prosper through evolution. However change can also be detrimental to company ...

    May 31, 2015 by

  • Tools & Templates

    Software Purchase Approval Form

    Software is a critical component of company operations, helping employees do their jobs so the business can meet its goals. Technological advances have moved us to a paperless, networked society where...

    May 31, 2015 by

  • Research

    IT Innovation Report 2015: Top companies, key tech drivers, and biggest roadblocks

    Innovation is crucial to business success. Tech Pro Research conducted a survey in March of 2015 to gather input about innovation. Topics covered include the importance of innovation, what technologic...

    April 30, 2015 by

  • Research

    Industry Cloud: Adoption, plans, decision factors, strategic results

    Cloud computing is a familiar phrase within the technology industry, but the diverse amount of services it involves makes it something of a blanket term. Like the general field of medicine, there are ...

    April 1, 2015 by

  • Tools & Templates

    Secure Browser Usage Policy

    Once a novelty in the dawn of the personal computing era, the web browser is now an indispensable feature of every computer. Most devices depend on the browser for work, recreation and general functio...

    March 31, 2015 by

  • Tools & Templates

    Cloud Data Storage Policy

    The rise of third-party cloud-based file storage applications has brought flexibility and ease of data access to users and businesses alike. Commonly used applications such as Dropbox, OneDrive and Go...

    March 26, 2015 by

  • Tools & Templates

    Penetration Testing and Scanning Policy

    System or network vulnerabilities and security threats can severely impact business operations or even shutter its doors. However, these incidents can be prevented by proactively detecting potential t...

    February 25, 2015 by

  • Research

    IT Security and Privacy: Concerns, initiatives and predictions

    Security and privacy were top issues in 2014, and so Tech Pro Research conducted a survey to find out what companies are planning for 2015. Now more than ever, security and privacy protections are of ...

    February 2, 2015 by

  • Tools & Templates

    Auditing and Logging Policy

    Many computer systems, network devices and other technological hardware used in the enterprise possess the capability to audit and log various activities. These activities include network traffic, int...

    January 30, 2015 by