450 KB | 3 files | DOC, PDF
Employees should know by now that installing file-sharing software on company hardware is a major security threat. Use this policy to ensure that they understand the rules against peer-to-peer file sharing and the consequences for breaking them.
Sharing company files via any platform other than secure FTP is a major security and intellectual property risk. Employees need to understand that they cannot use peer-to-peer file sharing software on company-owned devices or any hardware that connects to the company network.
Use this template to set file-sharing policies for your organization.
Included in this zip file are:
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail. ... More >>
This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications. ... More >>
The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. ... More >>