{"id":105,"date":"2022-09-12T18:31:29","date_gmt":"2022-09-12T18:31:29","guid":{"rendered":"https:\/\/oldstore.cyberadviser.net\/?post_type=download&#038;p=105"},"modified":"2022-09-12T20:43:06","modified_gmt":"2022-09-12T20:43:06","slug":"password-policy","status":"publish","type":"download","link":"https:\/\/oldstore.cyberadviser.net\/index.php\/downloads\/password-policy\/","title":{"rendered":"Password Policy Template"},"content":{"rendered":"<p>Download the Password Policy template.<\/p>\n<p>About the document:<\/p>\n<p>The Password Policy is designed to protect the electronic organizational resources by requiring strong passwords along with protection of these passwords, and establishing a minimum time baseline between changes of passwords.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-106\" src=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Password_Policy-232x300.png\" alt=\"\" width=\"199\" height=\"257\" srcset=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Password_Policy-232x300.png 232w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Password_Policy-46x60.png 46w, https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/Password_Policy.png 575w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/><\/p>\n<ul>\n<li>In Microsoft Word format (.docx)<\/li>\n<li>4 pages<\/li>\n<li>Aligned with ISO\/IEC 27001 standard requirements<\/li>\n<li>Easily customizable for your organization needs<\/li>\n<li>Created based on the adjustable corporate template<\/li>\n<\/ul>\n<p>Download:<\/p>\n<p><a href=\"https:\/\/oldstore.cyberadviser.net\/wp-content\/uploads\/edd\/2022\/09\/ISMS-POL-06_Password_Policy_Template.docx\">ISMS-POL-06_Password_Policy_Template<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Download the Password Policy template. About the document: The Password Policy is designed to protect the electronic organizational resources by requiring strong passwords along with protection of these passwords, and establishing a minimum time baseline between changes of passwords. In Microsoft Word format (.docx) 4 pages Aligned with ISO\/IEC 27001 standard requirements Easily customizable for &hellip; <\/p>\n","protected":false},"author":1,"featured_media":106,"template":"","edd-categories":[],"edd-tags":[3],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads\/105"}],"collection":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads"}],"about":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/types\/download"}],"author":[{"embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads\/105\/revisions"}],"predecessor-version":[{"id":131,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-downloads\/105\/revisions\/131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/media\/106"}],"wp:attachment":[{"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"download_category","embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-categories?post=105"},{"taxonomy":"download_tag","embeddable":true,"href":"https:\/\/oldstore.cyberadviser.net\/index.php\/wp-json\/wp\/v2\/edd-tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}