hackerslist.co - The Cyber-Security Training Tips Your Business

Page 1

The Cyber-Security Training Tips Your Business

hackerslist.co


ď ˝

As new threats arise, it is imperative to keep policies up to date to protect your business. Your employee handbook needs to include a multi-tiered IT security plan made up of policies for which all staff, including executives, management and even the IT department are held accountable.


Acceptable Use Policy ď ˝

Specifically indicate what is permitted versus what is prohibited to protect the corporate systems from unnecessary exposure to risk. Include resources such as internal and external e-mail use, social media, web browsing (including acceptable browsers and websites), computer systems, and downloads (whether from an online source or flash drive). This policy should be acknowledged by every employee with a signature to signify they understand the expectations set forth in the policy.


Confidential Data Policy ď ˝

Identifies examples of data your business considers confidential and how the information should be handled. This information is often the type of files which should be regularly backed up and are the target for many cybercriminal activities.


E-mail Policy ď ˝

E-mail can be a convenient method for conveying information however the written record of communication also is a source of liability should it enter the wrong hands. Having an e-mail policy creates a consistent guidelines for all sent and received e-mails and integrations which may be used to access the company network.


Wireless Network and Guest Access Policy ď ˝

Any access to the network not made directly by your IT team should follow strict guidelines to control known risks. When guests visit your business, you may want to constrict their access to outbound internet use only for example and add other security measures to anyone accessing the company's network wirelessly.


Incident Response Policy ď ˝

Formalize the process the employee would follow in the case of a cyber-incident. Consider scenarios such as a lost or stolen laptop, a malware attack or the employee falling for a phishing scheme and providing confidential details to an unapproved recipient. The faster your IT team is notified of such events, the quicker their response time can be to protect the security of your confidential assets.


Network Security Policy ď ˝

Protecting the integrity of the corporate network is an essential portion of the IT security plan. Have a policy in place specifying technical guidelines to secure the network infrastructure including procedures to install, service, maintain and replace all on-site equipment. Additionally, this policy may include processes around password creation and storage, security testing, cloud backups, and networked hardware.


Exiting Staff Procedures ď ˝

Create rules to revoke access to all websites, contacts, e-mail, secure building entrances and other corporate connection points immediately upon resignation or termination of an employee despite whether or not you believe they old any malicious intent towards the company.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.