TAGITM Monthly
 

Policies You Need to Tackle

Print this Article | Send to Colleague

 Building an information security program for a Texas government agency can be a complex and multifaceted process. The TAGITM Cyber security committee has published a Quick Start Guide with 6 areas on which to focus when getting started. The last article detailed the first step: have an Interim Incident Response Plan in place if you don’t have anything in place. This month we’re covering how to get started with your Information Security Policies and Procedure program.

These policies should be regularly reviewed, updated, and communicated to all employees and vendors who have access to your data. It's important to note that this is a general guide, and the specific policies required will vary depending on the organization and its unique needs. It is also important to consult with your legal team to ensure the policies will be effective and will meet all applicable regulations and laws. You don’t need to start from scratch; leverage your outside contacts in the IT security field for example policies or templates.  Remember that you don’t have to do it alone. TAGITM has several policy templates and other security resources to help you get started here.

  • Incident response plan: This plan outlines procedures for responding to security incidents, including data breaches, malware attacks, and other cyber threats. The plan should include incident identification, containment, investigation, and recovery procedures.

  • Password management policy: This policy establishes guidelines for creating and managing strong passwords, including password complexity, expiration, and reuse rules. Passwords are a weak point in security and can be easily guessed or stolen, so this policy helps ensure that employees are using strong passwords and updating them regularly.

  • Access control policy: This policy defines the access rights of employees to organizational resources, including data, networks, and systems. Access control ensures that only authorized personnel can access sensitive information and that the access granted is appropriate for the employee's role and responsibilities.

  • Security awareness training: This program provides employees with the knowledge and skills needed to identify and respond to security threats. It should cover topics such as phishing, social engineering, password security, and safe browsing practices.

  • Data backup and recovery policy: This policy outlines procedures for backing up and restoring critical data in case of a disaster or cyber-attack. It includes specifying the frequency of backups, the retention period, and the recovery procedures including regularly scheduled testing of backups.

These policies and procedures are essential because they establish a baseline of security practices which help protect against cyber attacks and ensure that employees are aware of their role in maintaining the organization's security. They also demonstrate a commitment to security that can be reassuring to customers and stakeholders.

Lindsay Rash
Education, TAGITM C²

 

Back to TAGITM Monthly

Share on Facebook Share on Twitter Share on LinkedIn