Home >>Governance, Risk and Compliance >> Security Policy Development

Security Policy Development

Cybersecurity policies are important because cyber-attacks and data breaches are potentially costly. At the same time, employees are often the weak links in an organization's security. Employees share passwords, click on malicious URLs and attachments, use unapproved cloud applications, and neglect to encrypt sensitive files. 

Every organization should have matured security policies to understand the boundaries within which the employees work. Policies cover the bare minimum acceptable usage of IT equipment and infrastructure as well as server-side policies ranging from user access to backup, storage and recovery.