Have you developed a Computer Usage Policy that instructs your employees what they can and cannot do on your business computer systems and equipment? Does a warning notice appear each time an employee logs into their computer? Do you have a policy and procedure in place for employee terminations and out processing? How about a document that provides instructions on how your company will respond to a security breach?
Most companies don’t have the necessary policies in place, which define and outline the strategic goals for the organization, especially when it comes to security-related policies.
A well-drafted security policy should be concise, realistic and contain achievable security goals. Sensei can assist in the development of new or review of existing policies, procedures and guidelines in coordination with cybersecurity best practices.
Most companies don’t have documented policies and procedures. If they do, most forget about them once they are completed often failing to enforce them thereby endangering themselves if the policies are relied upon in litigation. Policies and procedures should be reviewed annually at a minimum, and updated as necessary.
Some of the policies, procedures and guidelines that Sensei can assist with are:
- Computer Usage Policy
- Log-on Banners
- Internet Usage Policy
- Employee Termination Policies and Procedures
- Incident Response Policies and Procedures
- Information Security Policies
- Social Media Policies
- Written Information Security Program (WISP)
- Business Continuity Planning (BCP)
- Disaster Recovery Planning (DRP)
- Acceptable Use Policy (AUP)
Questions? Need Help?
Please contact CEO/Director of Cybersecurity and Digital Forensics Michael Maschke at firstname.lastname@example.org or at 703.359.0700.