Your policies should be living documents that evolve as your organization grows and changes. If it has been a while since your security policies have been reviewed, you may find that they are outdated, no longer comply with new laws and regulations or may not address the systems and technology you are using today. At a minimum, review security policies on an annual basis and take into consideration other indicators that your policies need to be reviewed.
Cybersecurity is an important issue for your organization. It should be a concern for your IT departments, organizational leadership and...
Recognizing that many organizations do not have the resources or time to jump into larger continuity plans, this article focuses on some initial steps that smaller communities and organizations can take to begin the process. Specifically, this article focuses on Backup Recovery Plans and Information System Contingency Plans to help organizations better prepare for a cyber disruptive event.
Organizations, both public and private, need to be prepared to address a disruption to operations whether it is due to a natural disaster, terrorist event or cyber incident. One of the first things that should be done to prepare is to develop a cyber continuity plan that can be put into action when a disruption occurs.
Information sharing is a key element of any cybersecurity program. This article introduces information sharing at the individual, organizational and community levels.
A security awareness program can be a valuable tool to ensure everyone understands the cyber threat and to reduce the amount of weaknesses that can be exploited by an attacker. When designing a security awareness program, you need to consider five key questions.
Establishing or enhancing your cybersecurity program should include four areas of improvement. Those four areas should be cybersecurity awareness, information sharing, policies and plans. Learn about each focus area here.