450 KB | 3 files | DOC, PDF
Employees should know by now that installing file-sharing software on company hardware is a major security threat. Use this policy to ensure that they understand the rules against peer-to-peer file sharing and the consequences for breaking them.
Sharing company files via any platform other than secure FTP is a major security and intellectual property risk. Employees need to understand that they cannot use peer-to-peer file sharing software on company-owned devices or any hardware that connects to the company network.
Use this template to set file-sharing policies for your organization.
Included in this zip file are:
The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. ... More >>
This document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating a variety of attributes. ... More >>
This excerpt from chapter 7 provides an overview of cellular networks, LANs, PANs, WLAN security, and best practices for mobile device security. ... More >>