Implementing World Class Best Practices Network Data
Breach Protection
Order Security Manual Template Download Sample
Data breaches will happen. Security and data breach protection are a never-ending process and that no CIO or CSO can claim that their data is completely secure.
The sheer number of data breaches reported this year alone has led to security experts dubbing this year as the "Year of the Hack. " What's an organization to do when the major technology companies are admitting they have been breached? With sophisticated malware, advanced attacks and sneaky insiders, security seems like an unattainable goal. Security is everyone's responsibility, from the board of directors, c-level executives such as the CEO, CIO, CFO, down to the front-line employees who actually work daily with sensitive information.
While implementing security measures is important, organizations also need to plan for the inevitable "what-if" scenario when systems and data are compromised.
World class best practices that every CIO should follow include:
- Establish Security as a Top Priority - Security is more than just preventing or limiting what people can do. Good security enables businesses to operate more securely by protecting revenue and profits that could be lost through a data breach. Treat security as an essential part of the company's mission.
- Conduct a risk assessment:
- Identify all risks, especially IT related risks
- Identify all areas where these risk can occurs
- Encrypt Sensitive Data - encrypt sensitive data stored on servers, laptops and portable media. If data is being stored on highly portable USB flash drives, encrypt those, too. If any of them are lost, no one can access the encrypted data.
- Implement a Strong Password Policy - Require all employees to change passwords frequently and make sure the selected passwords are strong. Educate users to not reuse passwords across multiple business or even personal accounts.
- Segment the Network and Computers Use separate computers for financial transactions such as banking and payroll. Don't access anything else, such as email or any other Websites from that machine, to foil malware and phishing schemes.
- Comply with all data protection regulations - become compliant with all relevant government and industry data preservation standards.
- Conduct Penetration Tests - use an external resources run penetration tests to find the vulnerabilities in the system.
- Implement an incident response plan - test the plan, so when data breaches happen, everyone knows what to do immediately.
- Train All Employees - teach employees to be careful of what they do on personal devices and what corporate data they download.
Order DRP BCP Security Bundle Download Sample
Security Policies and Procedures - First Step in Data Breach Protection
The IT Security Manual Template provides all the essential sections of a complete security manual and walks you through the creation of each step. Detailed language addressing more than a dozen security topics is included in a 230 plus page Microsoft Word document, which you can modify as much or as little as you need to fit your business requirements. The template includes sections on critical topics like:
- Risk analysis
- Staff member roles
- Physical security
- Electronic Communication (email / Smartphones)
- Blogs and Personal Web Sites
- Facility design, construction and operations
- Media and documentation
- Data and software security
- Mobile Device Access and Use
- Network security
- Internet and IT contingency planning
- Insurance
- Outsourced services
- Waiver procedures
- Employee Termination Procedures and Forms
- Incident reporting procedures
- Access control guidelines
- PCI DSS Audit Program as a separate document
- Security Compliance Checklists
- Massachusetts 201 CMR 17 Compliance Checklist
The Security Manual Template can be acquired as a stand alone item (Standard) or in the Premium or Gold sets:
Order Security Manual Template Download Sample