Your company should immediately start taking appropriate steps and measures to correct or minimize the risks and potential damages associated with this exposed data. Identify, understand and learn from past mistakes or failures, and adopt a more proactive and...
Microsoft Cloud Assessment
Microsoft takes the security of their platform very seriously, but that doesn’t protect you from your own people, who are often performing high-risk actions within these applications on a regular basis, regardless of whether their actions are accidental or...
Acceptable Use Policy (AUP)
The purpose of this policy is to outline the acceptable use of computer equipment at your company. These rules are in place to protect the employee and your company. Inappropriate use exposes your company to risks including virus attacks, compromise of network systems...
Business Disaster Recovery Plan
Overview Since disasters happen so infrequently, management often ignores the disaster recovery planning process. It is important to realize that having a contingency plan in the event of a disaster gives your company a competitive advantage. This policy requires...
Disaster Recovery Plan
This policy defines the requirement for a baseline disaster recovery plan to be developed and implemented by your company that will describe the process to recover IT systems, applications, and data from any type of disaster that causes a major outage. the module...
Email Policy
The purpose of this email policy is to ensure the proper use of your company's email system and make users aware of what your company deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within...