EMAIL SECURITY POLICY:
Email is used in all industry verticals, and is often the primary communication and awareness method within an organization. At the same time, misuse of email can pose many legal, privacy, and security risks. A company’s policies and procedures should address employees’ responsibilities with respect to email usage.
All or parts of this policy can be freely used for your organization. There is no approval required. If you would like a new policy or updated version of this policy, please email email@example.com
Documents are in a template format and are to be customized to fit the appropriate business and operational requirements. Use the free no-charge templates as a foundation to build a bespoke policy for your business.
These documents are enhanced using Human Intelligence (Hi) powered by the Riskigy vCISO team. For additional tuning and generating bespoke policies, procedures and plans the team can be reached at firstname.lastname@example.org
Disaster Recovery Policy Template (pdf)Download
Vulnerability Disclosure Policy Template (pdf)Download
Information Security Program Policy Template (pdf)Download
Information Security Committee Charter Template (pdf)Download
Physical Security Policy Template (pdf)Download
Social Engineering Awareness Policy Template (pdf)Download
Anti-Virus Management Policy (pdf)Download
Mobile Computing and Remote Working Policy (pdf)Download
Patch Management Policy (pdf)Download
Voicemail Security Policy (pdf)Download
Threat and Vulnerability Management Policy (pdf)Download
Technology Disposal Policy (pdf)Download
Training is a critical step in being prepared to respond to disasters and cybersecurity incidents. A educational and teambuilding way to help prepare your team is to hold tabletop exercises at least once a year.
Here are a few important benefits of holding routine tabletop exercises:
Learn and Practice based on real-world incident response scenarios and best practices.
Identify gaps between documented and expected responses in comparison to what happens.
A cost-effective way to help prepare your team is to hold routine real-world tabletop exercises.
Each of our Tabletop Exercise scenarios contains a real-world event based on our experiences, a cyberattack description and the potential impact which may occur to the organization. We also provide a list of goals and lessons to learn from the scenario outcomes. The scenarios are free to use and we encourage feedback and contributions.
If you need more help or a Riskigy vCISO to facilitate a customized TTE for your organization contact us to get scheduled.
Sign up to hear from us when we add new security policies, plans and templates.
Cyber & Tech Consultants, Researchers & Advisors
Copyright © 2023 Riskigy - All Rights Reserved.