Are You Having A Technology Emergency?

True North Networks Blog

True North Networks has been serving the Swanzey area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Create a Successful Cybersecurity Policy

As breaches become the new norm, having a cybersecurity policy becomes not just a matter of saving face, but of saving money, data, and valuable employee resources. Each year, thousands of breaches take place, resulting in the theft of over 1 billion records of personal identifiable information.

Getting Started
Ideally, your business’ cybersecurity policy should be documented, reviewed, and maintained on a regular basis. Even creating a short guide that covers the most important areas goes a long way in keeping your business protected. Visit the SANS Institute for free policy templates.

Compliance
First and foremost, make sure you’re operating within the law. For example, if you’re a financial institution, you will need to be compliant with SEC guidelines, as they will continue to focus on cybersecurity and mandate proof that safeguards are in place and designed to secure personal and sensitive information adequately to defend against cyber threats and vulnerabilities.

Infrastructure
Your cybersecurity policy should include information on controls such as:
• Which security programs will be implemented
• How updates and patches will be applied in order to limit attacks and vulnerabilities
• How data will be backed up
• Clearly identify roles and responsibilities.

Employees
No matter how strong your cyber defenses are, employees can introduce threats to your company’s networks by falling for phishing scams, posting secure information on social media, or giving away credentials. Your policy should clearly communicate best practices for users in order to limit the potential for attacks and threats. In addition, the employee policy should also cover what happens when users fail to comply with guidelines. Acceptable use guidelines can include:
• How to detect social engineering tactics and other scams
• What is acceptable Internet usage
• How remote workers should access the network
• How social media use will be regulated
• What password management systems might be utilized
• How to report security incidents

Information taken from: https://blog.malwarebytes.com/101/2016/03/how-to-create-a-successful-cybersecurity-policy/

Cybersecurity Starts with Training Your Employees
Watch Out for Fake Apps!
TOP