Sunday, September 29, 2013

Network Security Policies: Essential to all Levels of Business

Everywhere you go in today's society you hear the word security. Security has many meanings to people as they go about their daily activities. Security to one person may be ensuring that there is law enforcement in the area or that they live in a safe neighborhood but that's not the type of security we are examining this week. We are examining cyber security and the policies that help to regulate and implement these security needs.

But who is in need of these security policies? In short, everyone but for this we are going to discuss how businesses need this essential policy and program to defend themselves from hackers or breaches in data storage. There is no excuse that alleviates the need for a security policy. By saying my business is too small or I don't really have a lot of information stored you leave yourself vulnerable to attacks and essentially put your whole company and livelihood in jeopardy.

The basis of these security policies allow for users within to company to understand their roles and responsibilities, expectations while on the company network, and allows management a way to enforce violations to allow for change within the network.

So, what do you need to know? Well, when developing a security policy you need to ask yourself some questions to address the need of your business. For example, some of these questions may be:

1. What existing policy does our company have that also applies to what we want to do?

2. What do we want to out of our policy? Based on this, you will be able to identify criteria to determine the best service required and the best way to implement.

3.Do we have a good data classification policy and procedure and what type of data will we allow access to– sensitive corporate data, protected data such as PII, SSNs or HIPAA related, day-to-day operational data?

4.    What have others in our industry done and what can we borrow? Calling up a peer who’s already experience with the good, the bad and the unexpected can really help you craft your policy.

These are not necessarily the questions that you may need but they give you an idea of where to start, if you haven't already. The security policy should be a comprehensive document that enables users in your business to understand the expectations for data information management and the expectations of management in the event of a violation.

If you would like to read more, go to the following:


No comments:

Post a Comment