Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.
SMB security pack: Policies to protect your business
- Originally Published:
- Oct 2018
Small and midsize businesses are increasingly being targeted by cybercriminals—but they often lack the resources and expertise to develop comprehensive security policies to help defend against threats. This set of policies will help your company establish guidelines and procedures to reduce the risks.
The pack includes these policies:
IT staff systems/data access policy
IT pros typically have access to company servers, network devices, and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy offers guidelines for governing access to critical systems and confidential data.
Encryption offers a means of protecting data in transit or stored on devices--but organizations must follow proven methods and adhere to current standards for it to be effective. This policy outlines tested and recommended encryption technologies to help secure your corporate data.
IT physical security policy
This policy will help your organization safeguard its hardware, software, and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets.
Information security policy
To protect your information assets, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, IT staff, and supervisors/managers. This policy offers a comprehensive outline for establishing rules and guidelines to secure your company data.
Password management policy
Password-driven security may not be the perfect solution, but the alternatives haven’t gained much traction. This policy defines best practices that will make password protection as strong and manageable as possible.
Electronic communication policy
This policy provides guidelines for the appropriate use of electronic communications. It covers privacy, confidentiality, and security and is intended to ensure that electronic communications resources are used for appropriate purposes only.
Intrusion detection policy <
A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This sample policy establishes guidelines and procedures your organization can follow when your computer network is compromised.
Already a member? Log in here