dcsimg

Setting and maintaining successful security policies (page 1 of 2)

  • Sunday, August 16 - 2009 at 10:06

Data security is not just down to the IT department. Securing critical business information is the responsibility of the whole company. To do that, you need a well-written, easy-to-understand security policy so that everyone knows where they stand in relation to dealing with the company's information.

By Martin Lynch

These days, it's fair to say that your own employees pose as much of a threat to your sensitive data as shadowy cyber criminals and their sneaky malware. Numerous recent studies of employees have highlighted the problem.

Earlier this year, the Ponemon Institute, which conducts independent research on privacy, data protection and information security policies, released a study conducted among US workers that revealed that six out of 10 employees stole company data upon leaving their job in the last year. A higher proportion admitted to using the stolen data to get their new job.

A separate study in the UK by Infosecurity Europe, found that more than a third of employees would steal sensitive data if they thought they could make some decent money from selling it on. Alarmingly, 2% said they would steal data for a good dinner. So where do you start?

The best security system starts by developing a security culture within your company. The first, and most important, step in that process is creating a security policy.

A security policy, at its simplest, allows you to:
- outline the company's stance on data security
- identify what data needs to be protected
- educate employees about security issues and measures
- inform employees what is, and what is not, acceptable usage behaviour and the penalties for violating the rules
- create a framework for monitoring data and systems usage
- keep your business compliant with legislation and regulations

"The greatest threat to data security is lack of awareness, both at a corporate level and at an end user level," says Rik Ferguson, Senior Security Analyst at Trend Micro. "The security policy exists to authorise courses of action within the various areas of the company."

Driven from the top down


From those employed in the mail room to the CEO in the boardroom, data security is something that everyone has to take seriously or else the protection systems you put in place will fail.

While securing that data might require an IT solution, a good security policy must be initiated in the boardroom and fed down through the company. If you're not sure what exactly your security problems are, carry out a risk assessment process to discover your weaknesses.

Ferguson adds: "It is essential that the Board and chief executive level of the company are instrumental in designing the principles that the organisation will follow when securing information."

There is no 'one-size-fits-all' when it comes to security policies. Every company is different and the data they deal with ranges widely in value. A small company looking at security for the first time need only concern itself with the basics in a document that is just a few pages long.

A larger business with some existing security guidelines may have to create a number of security policies to address different workgroups. For instance, a technically-detailed security policy is not going to be read by most employees. Therefore, it has already failed. Tailor the security policy for the key groups in the business.

Good security policies


The best security policies should not come across as draconian either. They are not just there to police your workforce and club them over the head every time they visit Facebook on their lunch-break.

The policy should also not make it more difficult for people to do their jobs, as that will damage business performance and create a poor working environment.
Article Options

Disclaimer »

Articles in this section are primarily provided directly by the companies appearing or PR agencies which are solely responsible for the content. The companies concerned may use the above content on their respective web sites provided they link back to http://www.ameinfo.com

Any opinions, advice, statements, offers or other information expressed in this section of the AMEinfo.com Web site are those of the authors and do not necessarily reflect the views of AME Info FZ LLC / 4C. AME Info FZ LLC / 4C is not responsible or liable for the content, accuracy or reliability of any material, advice, opinion or statement in this section of the AMEinfo.com Web site.

For details about submitting your stories, please read the guide - all content published is subject to our terms and conditions