Policy Spotlight
EMAIL SECURITY POLICY:
Email is used in all industry verticals, and is often the primary communication and awareness method within an organization. At the same time, misuse of email can pose many legal, privacy, and security risks. A company’s policies and procedures should address employees’ responsibilities with respect to email usage.
All or parts of this policy can be freely used for your organization. There is no approval required. If you would like a new policy or updated version of this policy, please email media@riskigy.team
Documents are in a template format and are to be customized to fit the appropriate business and operational requirements. Use the free no-charge templates as a foundation to build a bespoke policy for your business.
These documents are enhanced using Human Intelligence (Hi) powered by the Riskigy vCISO team. For additional tuning and generating bespoke policies, procedures and plans the team can be reached at info@riskigy.com
Disaster Recovery Policy Template (pdf)
DownloadVulnerability Disclosure Policy Template (pdf)
DownloadInformation Security Program Policy Template (pdf)
DownloadInformation Security Committee Charter Template (pdf)
DownloadPhysical Security Policy Template (pdf)
DownloadSocial Engineering Awareness Policy Template (pdf)
DownloadAnti-Virus Management Policy (pdf)
DownloadMobile Computing and Remote Working Policy (pdf)
DownloadPatch Management Policy (pdf)
DownloadVoicemail Security Policy (pdf)
DownloadThreat and Vulnerability Management Policy (pdf)
DownloadTechnology Disposal Policy (pdf)
DownloadTraining is a critical step in being prepared to respond to disasters and cybersecurity incidents. A educational and teambuilding way to help prepare your team is to hold tabletop exercises at least once a year.
Here are a few important benefits of holding routine tabletop exercises:
Learn and Practice based on real-world incident response scenarios and best practices.
Identify gaps between documented and expected responses in comparison to what happens.
A cost-effective way to help prepare your team is to hold routine real-world tabletop exercises.
Each of our Tabletop Exercise scenarios contains a real-world event based on our experiences, a cyberattack description and the potential impact which may occur to the organization. We also provide a list of goals and lessons to learn from the scenario outcomes. The scenarios are free to use and we encourage feedback and contributions.
If you need more help or a Riskigy vCISO to facilitate a customized TTE for your organization contact us to get scheduled.
Sign up to hear from us when we add new security policies, plans and templates.
Cyber & Tech Consultants, Researchers & Advisors
Info@riskigy.com
Copyright © 2023 Riskigy - All Rights Reserved.
This website uses cookies. By continuing to use this site, you accept our use of cookies.