Six Keys to a Secure Workstation
In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.
Protecting business desktops, laptops, tablets and other IT equipment from misuse starts at the end-user level. It's important that the business defines boundaries for appropriate use and communicates those boundaries clearly and concisely to all employees. Creating policies is the first step in setting those boundaries and enforcing them.
Toolkit Cafe contributed the IT Computer Equipment Security Policy template to assist others in the creation of policies that protect both the organization and the employee. The template, part of its comprehensive IT Governance and Compliance Toolkit, can be fully customized to reflect pertinent policy details, including content owners and revision history. Initially, it provides five common policy items that you can revise to meet your business environment. These items outline the official stance on:
In addition, the template includes spaces for indicating who employees should address questions to within the IT department and what the consequences are for non-compliance.