POLICY PROCEDURES
How do you protect against financial losses from cybercrime? One solution is to be proactive about employee education. Teach your staff to understand their role in becoming the frontline in today’s cyber defense. Security policies are great training tools because they contain the essential information you need to safeguard your organization. Here are four essential policies that promote IT security education:
Please feel free to contact us for a FREE consultation.
- Written Information Security Policy (WISP)
- Acceptable Use Policy—Also called an AUP, this agreement between employees and the company specifies the appropriate use of access to networks and the internet, clarifying what users may and may not do.
- Data Breach Response Policy—This document describes the process followed in the wake of an information security incident, including definitions of a breach and who is involved in the response.
- Disaster Recovery Plan Policy—This plan launches when operations must recover from the loss of IT capabilities, whether by natural or virtual catastrophes.
- Password Protection Policy—These rules guide creating, using and maintaining strong passwords.
Please feel free to contact us for a FREE consultation.