Internal Security Policies: Your Best Defence Against Threats

It’s not one policy that you need to ensure your business security, but rather a group of policies that address critical areas that form your security program.

Headlines love stories about the big cyber-attack from reprehensible outsiders. These do happen way too often, but what we don’t hear about often enough is the overwhelming percentage of breaches are caused by an error or action of a staff member. Usually inadvertent, but sometimes malicious.

Where Do Employees Go Wrong?

Human mistakes happen, you can mitigate risk through policies and training and reduce how often they happen. However, while it may be difficult to eradicate them altogether, you can strategise to reduce their impact in the event that they happen.

So, what are the key areas where errors happen:

  • Misaddressed emails
  • Stolen devices – or personal devices without the right security
  • Insecure home systems for remote workers
  • Unhappy employees with malicious intent
  • Employee’s identities hijacked by cyber criminals

What Security Policies Do You Need to Secure Your Business?

It’s not just one policy that you need to ensure the security of your business, but rather a group of policies that address critical areas that form your security program.

Acceptable Use Policy (AUP)

The AUP outlines both the practices and constraints that your employees using company assets need to consent to before they are granted access to your internet and network. Every new employee should sign one at the commencement before being given a network ID.

Access Control Policy (ACP)

Limiting access to information and data systems available to employees is standard. Not everybody needs access to everything so building in security stages that require different types of access is an additional level of security.

The ACP outlines these access types as well as:

  • criteria for all user access
  • how network access controls are mandated
  • the software controls of your operating system
  • corporate passwords and the required complexity
  • how corporate systems are monitored and accessed
  • how to secure any unused and unattended workstations should
  • how access is cancelled when an employee exits the company

Change Management Policy

Having a framework for managing change within your organisation starts with your Change Management Policy. This documents how changes will be communicated throughout the business and how they will be conducted to minimise disruption.  

Remote Access Policy

With more staff members working remotely, your Remote Access Policy is more important than ever. It outlines the ways that are acceptable for workers to remotely connect to your company’s internal network. You can also add BYOD guidelines to this document.

Email/Communication Policy

This policy covers how your employees are allowed to use the company’s electronic communications and can cover:

  • email
  • blogs
  • social media
  • chat features

Information Security Policy

This is a high-level policy that covers a wide range of security controls. It is designed to ensure that all employees who do use any of the organisations IT assets and network are aware of and comply with all documented guidelines and rules.

Disaster Recovery Plan

How well you recover from an attack, or a crisis is a matter of planning rather than good luck. A comprehensive Disaster Recovery Plan outlines how any incident will be handled and triggers risk assessment and staff training to ensure its success.

Business Continuity Plan (BCP)

The BCP ensures that the Disaster Recovery Plan is being used effectively to restore your business following an attack or disaster. This includes all applications, data, and hardware that is vital to mitigate damage and restore business continuity.

A Few Last Words

Having these policies in place in your business, and combined with robust IT security solutions, will protect your business in the event of an attack and enable you to recover. Every business is different and it’s advisable to get expert assistance to ensure that you are fully covered.

If all of this has you confused and overwhelmed you are not alone. At Preterion we get it, this is our business, and we can make sure that you can focus on yours. If you need help with your IT security or assessing your network for vulnerabilities, we are here to help.

Scroll to Top