Title of the Issue:
DEVELOPING AND IMPLEMENTING AN ACCEPTABLE USE POLICY IS ONE OF THE FIRST STEPS
IN CREATING A COMPANY WIDE CULTURE OF TECHNOLOGY RISK MANAGEMENT.
Title of the Article:
Privacy and Security
Source:https://www.itispivotal.com/post/how-to-create-an-acceptable-use-policy
Author: BETH STEWART
a) Summary Narrative:
Sometimes referred to as an Internet Policy, an
Acceptable Use Policy (AUP) is a formal set of rules governing computer,
network and data usage that can help limit your exposure to data breaches,
minimize cyber risks and protect your business’ reputation. Recent technology
developments, laws and regulations have made creating an effective AUP more
challenging.
Cybersecruity
training can help to ensure end-users adhere to your AUP. When the reasoning behind your policy is
understood, employees are more likely to recognize the value of it and to
adhere to it. By educating your
employees about how quickly your entire network can be infected by
irresponsible browsing, a stealthily malware downloaded onto a single computer
or connecting an unauthorized personal device, you are also helping them
understand your policies are not meant to “micro-manage” or deny them all
access rights to the internet.
b) What lesson have you
learned?
I have learned the vital role of Acceptable Use of Policy
(AUP) in the security of our network. And the important elements to consider
including when creating and customizing an effective Acceptable Use Policy. One
of the most important parts of your Acceptable Use Policy is the Code of
Conduct, which outlines the expectations and behavior for end users while
connected to your network. Prohibited activities should be clearly defined and
include items such as activities that violate any local, state or federal laws,
disclosing or sharing confidential information about your company, its clients
or partners, using appropriate language online, ensuring activities do not
disturb or disrupt other users on the network. As an employer, your policy
regarding on business interests, should include a clear definition of business
use, inform employees of expected ethical conduct while using these resources,
and their accountability for all use of corporate accounts.
And
if you allow personal devices of any kind they need to be included as part of
your Acceptable Use Policy. Rules for
what organizational data is allowed on personal devices and expectations for
how that data is accessed, transmitted and stored should be clearly outlined. You should also address any required mobile
device management software, antivirus software, security controls, identity
management measures and remote wipe tools.
Social
Media platforms can offer tremendous benefits for marketing and communication,
but they can also pose serious security risks. Some of the greatest risks are
the accidental disclosure of sensitive information, and accounts being
compromised by phishing/malware attacks either directly or through password
reuse and single sign on. Your
Acceptable Use Policy can provide you the ability to actively put restrictions
in place to help you mitigate security risks and limit the amount sensitive
information shared on social sites.
c) What suggestions can
you offer?
The suggestions I can offer is to arm ourselves with as
much information as possible to customize our policy to fit our unique
processes and operations. An effective
policy not only outlines the rules (and the potential consequences for breaking
them), explained why the rules existed. Your AUP should clearly define the
systems, devices, communications and information that fall within the policy’s
scope. Don’t forget to include often
overlooked items such as password requirements, corporate text messaging,
voice-mail, storage media, and company software and cloud computing accounts.
Arming yourself with
industry specific security information can help you craft an acceptable use
policy to addresses your specific risk factors.
Knowing that your industry may be a target can also help you advice and
educate your employees accordingly which can help to lessen the chances of a
successful attack.
There are many options
to help you discreetly enforce your Acceptable Use Policy such as restricting
access to sensitive information, configuring laptops and desktops to prevent
installation of applications and content filters and/or firewall rules to block
prohibited activities.
B and C should not be 'copy+paste'
ReplyDelete