What should be included in a written security policy?

Depending on the industry that you are in, and the data security and compliance regulations that may apply to you, a security policy can be quite involved.

At a minimum, every business should have a written security policy to demonstrate that the company takes data privacy and security seriously and has systems in place to protect it.

Without having a policy in place, that all employees have seen and agree to abide by, it may be problematic should a problem develop in the future.

A basic security policy should include:

  • Password policy  (click HERE for password policy tips)
  • Acceptable Use Policy for email, internet browsing, social media, etc. (click HERE for AUP tips)
  • Access and control of proprietary data and client data
  • Access to company data from remote locations, or on non-corporate devices
  • Physical security protocols for doors, dealing with visitors, etc.
  • Understanding data classification, what is critical and private data?
  • How to deal with and report lost or stolen devices
  • How to handle and report a suspected security breach or data loss
  • Requirements and expectations for Security Awareness Training  (click HERE for cybersecurity training tips)
  • Use of third party cloud or file sync services such as Gmail, Dropbox, etc.
  • Requirements for encryption and computer locking procedures

There are very specific requirements that your business may need to adhere to, and there are tools and templates available to help get started. If you would like to see some sample policies and talk about how we may be able to help you put a plan in place, give us a call today!

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Strategies to Control Your Passwords

Passwords are the keys to digital access, but they're often not treated as keys; meaning they aren’t always protected by their users. Unfortunately, people don’t always do everything they can to protect their passwords and there are a lot more scammers out there than pickpockets. Effective password management is crucial for any business. It works to maintain the security of online accounts and se...

Securing Your Wireless Network

Alter the Security Information on Your Router As with any account that is protected by a password, you will want to ensure that your router?s login information is changed to something much more secure than the default configuration that comes with the device. This is because any default credentials for router models can be found online and can easily be accessed by anyone that can use a Google se...

Ransomware is Still a Major Threat for All Businesses and Individuals Alike

Prioritize Your Backups We recommend that you make data backup a top priority for your business in just about all situations possible. Good backups keep your data safe in an isolated environment where they can be accessed as needed. We recommend you use the cloud, offline backups, or off-site data centers for your storage needs. You can also use automation to ensure that the process is as consist...

Implementing Bring Your Own Device, Without Bringing Your Own Risks

First, let?s go over what a Bring Your Own Device policy is, and why it has become a popular strategy for modern businesses to implement. Why is a BYOD Strategy a Popular Option for Businesses? Bring Your Own Device is a policy and implementation that enables your team to make use of their personal devices for work purposes, which presents various benefits for both parties. From the employees? p...