IT policies and procedures are intended to keep companies, their employees, and their customers safe. Your organizations should have written acceptable use policies and and best practices included in the employee training manual and/or on-boarding documentation.

Depending on your organization’s industry and the type of data you work with, there may be additional policies that you may need to implement. Additional security may be required to be compliant with HIPAA, FISMA, GBLA and other regulatory mandates as well as with CTPAT, PCI and other industry-specific security frameworks.

Organizations and the individuals within them have unique needs, therefore policies should not be absolute. Implement a review process for policy exception requests. The objective should be to balance usability and user satisfaction while maintaining an acceptable level of security based on risk.

Create a statement defining what disciplinary actions will be taken with employees who violate security policies. Policies should be enforced if you wish to have them taken seriously.

Below you will find our own set of recommended policies which are partially derived from NIST (National Institute of Standards). We ask all of our clients to abide by them in order to maintain an adequate level of cyber safety as well as to implement these policies into their own organization. Contact us for complimentary assistance in discussing and implementing these and other good IT policies in your place of business.

Cyber Security Policies and Best Practices

Behavior Analysis/DLP/File Auditing

File auditing and DLP should be implemented to prevent sensitive information from leaving the network perimeter via unauthorized channels such as email, file uploads or copy/paste to portable media in organizations that store personal health records, personally identifiable information and/or intellectual property.

Data Loss Prevention (DLP) is a security measure that is designed to prevent the unauthorized access, use, or disclosure of sensitive or confidential data. DLP systems monitor data flows within an organization and use a set of rules or policies to identify and prevent the unauthorized access or transmission of sensitive data. DLP systems can be implemented at various points within an organization’s network, such as at the perimeter, on servers, or on endpoint devices, and can be configured to detect and prevent the transmission of sensitive data through various channels, such as email, web, or file transfer.

File auditing and DLP are important tools for protecting data within an organization and helping to ensure that sensitive information is not accessed or disclosed without authorization.

Change Requests

When users request changes to access control ACLs (changes in permissions or access) from our help desk, it must be approved by the company’s designated authorized contact. We will make no access control changes based on user requests without proper authorization. Organizations should assign a knowledgeable and trustworthy person as the authorized point of contact (POC) who will responsibly approve or deny ACL changes.

When a POC requests access to data (such as e-mails, database or folders) from an employee that is higher in rank, the request must be approved by the organization’s ownership or directorship. Any owner or director who requests access to another owner or director’s data will require the party’s agreement.

Contractor Requirements

Ensure that contractors who have access to an organization’s network resources or physical assets are following the same security protocols as organizational personnel. This helps to ensure that sensitive data and systems are not compromised by unauthorized access or activities. Overall, these practices help to ensure that contractors who have access to an organization’s network resources or physical assets are following the appropriate security protocols and are not able to compromise the organization’s data or systems.

Password Policies

Make use of good password policies. ​​Passwords should be at least 12 characters long (preferably phrases) that are easy to memorize but hard to guess. They should not contain information that can be extrapolated from social media or from casual conversation such as family & pet names, birth dates, schools attended or hobbies. ​

Disallow keeping passwords on sticky notes or stored electronically on PCs. Do not allow saving/storing passwords within browsers. Write passwords on paper and keep them in a combination safe or locked drawer. A secure, organization-approved password wallet or key ring may also be used.  Do not share passwords with anybody, not even IT or help desk staff. If a technician resets and tell you your new password, make sure to change it immediately afterwards.

Do not reuse the same password or numerical variations of the same password for multiple services. Do not transmit passwords by email, text or smartphone apps (even if encrypted).  A good strategy to memorize secure passwords is to use a mix of numbers and words in the form of a phrase, separated by special characters. For example: Chocolate=My.Favorite.Ice.Cream. The passwords used for work devices should be unique. Do not use the same passwords, or variations used in social media, public email, etc.

Portable Media Policies

​Using portable media can be risky because it is often easy to lose track of these devices, and they can be used to transfer data to and from untrusted devices, which can be a conduit for malware. In order to reduce these risks, it is often a good idea to block the use of portable media unless it is specifically required for business purposes. Contact our help desk for assistance with transferring files securely without having to use portable media devices. We have a variety of tools that are available for securely transferring files.

Data Classification Policies

Data classification involves grouping data into different categories based on its sensitivity and the level of protection it requires. This can include things like personally identifiable information (PII), protected health information (PHI), and intellectual property (IP).

One key aspect of data classification is specifying which channels are approved for transferring different types of files, and with whom these files can be shared. By establishing clear rules for the exchange of sensitive files, organizations can help to ensure that sensitive data is not shared outside of approved channels or with unauthorized users.

To achieve this, organizations should define which channels are approved for transferring different types of files, and specify which users are authorized to access these files. These rules should be included in the organization’s acceptable use policy, and should be enforced using tools such as data loss prevention (DLP) systems.

By following these practices, organizations can help to ensure that sensitive data is protected and that it is only shared with authorized users through approved channels. This can help to reduce the risk of data breaches and protect the organization’s sensitive information.

Management & Administration

​Administrative access to IT infrastructure is a function solely of Falcon IT Services and our staff. We research, test and scan all unknown programs prior to installation and insure integrity via the proper download sources. No other personnel should have administrative access to any devices, including the ability to install programs and make configuration changes to their PCs or other devices.

Equipment Purchasing Policy

Commercial grade hardware products are designed for use in more demanding business environments and are typically more secure, durable and reliable than consumer grade products. These products may be more expensive than consumer grade products, but they are often worth the investment because they are less likely to fail or experience downtime. Please contact us for purchasing assistance before procuring equipment or if you wish to have a list of recommended commercial grade products.

Duty to not Deliberately Waste Resources

Employees must not deliberately perform acts that waste computer resources or unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive amounts of time on the Internet, playing games, engaging in online chat groups, printing multiple copies of documents, or otherwise creating unnecessary network traffic.

Because audio, video and picture files require significant resources, they may not be transferred, copied or downloaded using business resources unless they are for business-related purposes. ​Internet surfing should be limited to work related Web sites.

Please do not contact the help desk over matters not related to solving business productivity issues. This includes assistance in troubleshooting non-business PCs, personal e-mail addresses or personal smart devices.

Login Policy

​It is recommended that organizations have a Windows login message that users must view before they log in to their computers. Use a generic message such as the one described below or contact your legal team if you have specific requirements.

*** NOTICE *****

This device is a private computer system owned by COMPANY NAME and is intended solely for official company use by authorized personnel.  Unauthorized access or use of this system may subject violators to criminal, civil and/or administrative penalties.  By logging in to this computer you agree to abide by both the COMPANY NAME acceptable use policy, as well as the best practices and baseline security policies outlined in the support section of www.falconitservices.com. COMPANY NAME reserves the right to monitor all activity on all company provided equipment and services.

File Storage & Transfer Policies

​​Define what channels are approved for storing and transferring files and disallow the transfer of files outside the specified secure channels.

Email Attachment Blocking Policy

​File attachments that may contain malicious code (executable files, compressed files, macros, etc.) should be blocked at the email gateway.

Personal Email Policy

​​Personal email access should be blocked in order to prevent employees from using public email as a means of circumventing security policies or to conduct official business.

Remote Access

We recommend disallowing installation and usage of unsanctioned remote access connections. ​Provision remote access over an encrypted VPN tunnel utilizing multi-factor authentication. If utilizing public cloud remote control software, it should be centrally managed and secured by the organization and all freeware or end user managed remote access programs should be blocked.

Users that have laptops for remote access should log in at least once per week to test their credentials, connections and to keep their computers up to date. This is necessary to make sure that the login process, passwords and procedures are known and work when they are needed.

Cyber Training: ​ Have all your new hires take our cyber crime awareness training and require existing staff to attend the course at least once per year. We track attendees via a database and can certify attendees for organizations that have insurance, regulatory or organizational requirements. Attendees who complete the course also receive a certificate of completion and gift.

Security awareness training is a type of training that is designed to educate employees about the importance of cybersecurity and how to protect their organization’s data and systems from threats such as malware, phishing attacks, and other cyber threats.

Security awareness training typically covers topics such as:

  1. Types of cyber threats: Employees are educated about the different types of cyber threats that they may encounter, including malware, phishing attacks, and other threats.
  2. Best practices for security: Employees are taught best practices for security, such as using strong passwords, avoiding suspicious links or attachments, and reporting any suspicious activity.
  3. Company policies: Employees are made aware of the organization’s security policies and procedures, and are taught how to follow these policies to help protect the company’s data and systems.
  4. Reporting procedures: Employees are taught how to report any security incidents or suspicious activity to the appropriate authorities within the organization.

Overall, security awareness training helps to educate employees about the importance of cybersecurity and how to protect the organization’s data and systems from threats. This can help to reduce the risk of security breaches and improve the overall security posture of the organization.

Smartphone Policies

Create policies for users who use BYOD (bring your own device) devices or smartphones to conduct company business.

Here are some examples of smartphone corporate policies:

  1. Use of corporate-owned devices whenever possible: Employees should be required to use corporate-owned devices for work purposes if possible, and be made aware of the caveats of BYOD. For example: When employees use their personal devices for work purposes, the organization’s data may be stored on devices that are not under the control of the organization. This can potentially expose sensitive data to unauthorized access or theft. If the device if subpoenaed for discovery, the user’s personal information will be at risk of being viewed and the organization may be at risk for legal action as a result of this.
  2. Device security: Employees should be required to enable security features such as passwords or biometric authentication on their devices, and may be prohibited from rooting or jailbreaking their devices.
  3. Data protection: Employees may be required to take steps to protect the data on their devices, such as encrypting sensitive data or installing security software.
  4. Internet usage: Employees may be required to follow internet usage policies, such as only accessing approved websites or avoiding the download of unauthorized software.
  5. Device usage: Employees may be required to follow usage policies, such as not using their devices while driving or only using them for work purposes during work hours.
  6. Device loss or theft: Employees may be required to report the loss or theft of their devices to the appropriate authorities within the organization.
  7. Device repair and maintenance: Employees may be required to take steps to ensure that organizational data is removed before disposing of the device or sending it out for repair.

Overall, smartphone corporate policies help to ensure that employees use their devices responsibly and protect the organization’s data and systems from potential security risks.

Do not allow jail broken devices (tablets or smartphones) to operate within the trusted network, used to conduct business or connect to organizational resources. Jail broken devices or devices with hacked operating systems often have a malicious component that may be hard or impossible to detect.

On-boarding Policy

New employees should be provided with a written acceptable use and cyber security policy. New hires should take our cyber security on-line course as part of their training program.  You can find the Cybersecurity training course schedule by visiting our events calendar.

Network Segmentation Policy

Separate parts of your network (known as network segmentation) into trusted and untrusted zones. NVRs, IP phones, IoT devices and WiFi guests should be in the untrusted network segment, separated from PCs, servers, storage, backup devices and other sensitive data. Use MAC address filtering to prevent non-managed devices or untrusted devices from connecting to the trusted network segments.

​URL Filtering

​​Internet surfing from organizational devices should be limited to work related Web sites. Create groups that provide role-based Internet access using URL filtering. Sites that are conducive to malware such as pornography, gambling, P2P, hacker, anonymizers, URL redirects and known malware/phishing/infected sites should be blocked for all users, no exceptions.

UTM/WAF Firewall

Implement a ​UTM/WAF firewall to provides additional security features such as filtering malicious traffic at the gateway as well as blocking traffic to/from countries that are not necessary to access for day-to-day business operations (Geo-filtering). Recommended UTM settings are gateway malware filtering, gateway IPS/IDS and geo-filtering.

Software Policies

Disallow the use of key generators or cracked software programs. These programs typically carry malicious code in the form of Trojan horses. Do not unblock or whitelist piracy sites or cracked software sites (warez) due to the security risks involved.

Network and On-Line Storage Folder Creation Policy

​When creating folders to store data, please contact our help desk to have us set access controls for the newly created folders if the information contains sensitive data. By default, newly created folders take their permissions from the parent folder, which may not be suitable for storing sensitive data. Setting the access controls for the newly created folder ensures that the permissions are properly configured to protect sensitive data. This can help to reduce the risk of unauthorized access to sensitive data and can also help to ensure compliance with data privacy and security regulations.

It is important for employees to follow this policy and to contact the help desk whenever they create a new network shared folder to store data. This can help to ensure the security and integrity of the organization’s data.

Organizational Access

​Do not log in to Webmail, Intranet Web sites, VPNs, or any other organizational servers & services from any device other than your secured, work-issued computer.  Use only managed devices to connect to organizational assets and conduct business.

This policy is designed to help protect the organization’s data and systems from potential security risks by limiting access to organizational assets to only work-issued computers that are managed by the organization. By requiring employees to use only work-issued computers to access Webmail, intranet sites, VPNs, and other organizational servers and services, the organization can ensure that these assets are accessed from devices that have been configured and secured according to the organization’s security policies.

This policy can help to reduce the risk of unauthorized access to organizational assets and can also help to prevent the accidental or intentional leakage of sensitive data. It is important to enforce this policy and to ensure that employees are aware of the importance of using only work-issued computers to access organizational assets.

Single Sign On Policy

​Do not use the organizational e-mail and credential as single sign-on conduits for non-organizational on-line services such as Instagram, Facebook, Google and others, unless specifically approved. Do not log in to your PC using SSO or personal cloud accounts. Doing so may break regulatory compliance and introduce risk into the organization and its data security policies.

Assignment of Rights

​All data that is composed, transmitted and/or received by, or through the organization’s computer systems is considered to belong to the organization and is recognized as part of its official data. It is therefore subject to disclosure for legal reasons or to other appropriate third parties. Make sure your employees are aware that any personal data stored on your organizations electronic assets may be wiped, viewed or made public in cases involving legal disputes and/or legal discovery.

Statement Review

Conduct a managerial review before allowing employees to make any statements, negotiations or communications via e-mail, social media or on-line postings. Communications made using these mediums can be legally binding contracts and/or be libel, infringing or in violation of third part privacy. Add an email disclaimer stating that any statement made by email cannot be construed as a binding contract.

Secure Communications

Do not transmit PII (Personally Identifiable Information), PHI (Personal Health Information), PCI data (credit card numbers), IP (intellectual property), password or other sensitive data via unencrypted email, chat or any unauthorized means. Use only encrypted channels and authorized methods based on acceptable use policy.

Voicemail

​Do not use simple numeric passwords or dates for voicemail PINs and do not store sensitive information in voicemail (i.e., leaving messages with PHI/PII or passwords). If you check your voicemail from outside the country, make sure to delete your messages each time you log in, and change your voicemail PIN when you return.

​​Unacceptable Use of Systems:

  • Sending or posting discriminatory, harassing, or threatening messages or images on the Internet or via the organization’s email service.
  • Using computers to perpetrate any form of fraud, and/or software, film or music piracy.
  • Stealing, using, or disclosing someone else’s password without authorization.
  • Downloading, copying or pirating software and electronic files that are copyrighted or without authorization.
  • Sharing confidential material, trade secrets, or proprietary information outside of the organization.
  • Hacking into unauthorized websites.
  • Sending or posting information that is defamatory to the organization, its products/services, colleagues and/or customers.
  • Introducing malicious software onto the company network and/or jeopardizing the security of the organization’s electronic communications systems.
  • Sending or posting chain letters, solicitations, or advertisements not related to business purposes or activities.
  • Passing off personal views as representing those of the organization.

Hotspot/Wi-Fi Policy

Disallow phones and computers from automatically connecting to open networks. When connecting to semi-open network (coffee shop/airport) where you connect to an open network, then go through an authentication page, always connect to the VPN before accessing organizational resources. Avoid public hot spots when conducting sensitive business such as banking or the transferring or access of sensitive information.

Asset Disposal Policy

Create a policy to securely dispose of assets is a responsible manner. Smartphones, computers, IoT devices, printers & copy machines, USB storage devices, CD/DVDs and paper documents can all contain sensitive information. Make sure to wiped or encrypted the data before discarding the device or sending the device out for repair.

Scanned Documents

Do not scan documents with sensitive information to your email address or send scanned documents with sensitive information directly to mailboxes outside the organization. All documents with PII/PHI/PCI should be scanned to the scan folder and then immediately moved to a folder with the proper security controls based on the sensitivity of the information that was scanned.

Device Encryption

Portable devices which contain sensitive information should be encrypted. Do not store sensitive information on non-encrypted portable devices such as laptops, tables or smartphones which may become lost or stolen. Sensitive information should be stored only on authorized devices (such as server file shares), and in their appropriate storage folder, based on the sensitivity level of the information. The servers that store information should be in a locked IT room with limited access.

Categorize Data Sensitivity

Categorize data based on the level of sensitivity and create a written policy that dictates where data of various levels of sensitivity can be stored. Limit access to sensitive data using access of least privilege which is loosely translated to access on a need-to-know basis.

Auditing

There are different type of auditing that can be done to ensure that rules are being followed and that people, processes and technologies are in accordance to organizational guidelines. Audits can be performed by an internal compliance manager, an outside source or a combination of both.

People can be audited to find insiders who may be negligent or malicious. DLP technology can be used to audit people as well as other non-technical methods.

Processes are audited to ensure that they are running within defined limits. temperature, response times and other factors are examples of process audits.

Technologies are audited to ensure that best practices are followed. When obtaining cyber-insurance, you usually have to fill out a self-certified affidavit that asks you to audit an certify certain technology standards such as having backups, anti-virus and up-to-date software patches.

Some audits are complex, follow specific rules and are used to certify entities (i.e. ISO 9000, CE, etc.) but you don’t have to be a huge organization to do auditing. Figure out what part of your organization you want to protect and create an auditing policy and guidelines according to your organization’s size, budget, regulatory requirements and other available resources.

 

Backups

Create a backup policy that defines the minimum requirements: retention periods of backed up data, frequency (grandfather, father, son) and assets used to back up. Define whether backups are on-site, off-site or both. Additional requirements may be necessary for compliance or safety measures.

Define the RTO (recovery time objective) and how backups should be tested (manual/automatic/frequency). By default, Falcon IT Services configures backups as follows: daily backups for 7 days, weekly backups for 4 weeks, yearly backups for 5 years. These settings may be higher where compliance dictates or lower based on available storage and resources.

AI Policies

AI tools such as Chat GPT, BARD and Bing can be useful in helping streamline workloads. These tools however have caveats and should be used according to specific guidelines. AI is not a substitute for human intelligence and their output may have serious security, accuracy and copyright implications.

Before using AI, an organization should draft an AI policy and maintain a whitelist of approved AI tools while denying all others. A committee of stakeholders should be set up to evaluate tools based on other user’s experiences, product reviews and legal writings before whitelisting.

Each whitelisted tool should individually have limitations based on what can be input determined by the terms and conditions of the tool’s creators. Before using any AI tool, the terms and conditions should be fully understood by the stakeholders before determining what input is allowed.

Keep in mind that AI can leak training data. Consider disallowing any protected health data, private or personal data and intellectual property (PHI, PI, IP) from being entered into AI tools regardless of the terms and conditions and/or privacy statement made by the AI’s creators. Treat the data that will go into any AI as if it was being posted on social media.

AI is prone to “hallucinations” and output may be inaccurate, offensive or harmful. For this reason, all output should be verified by a human before being posted publicly or before being used as part of any business process.

Create a process where the AI’s output can be reviewed by a stakeholder or supervisor and notify them any time an AI tool has been used to create data that will be used publicly and/or in critical business processes.

Never represent the work generated by AI as an organization’s (or individual’s) original work.

Do not use AI as a basis for human resources, medical, financial or other decisions made by human personnel working in regulated departments or industries.

Do not delegate, grant access or otherwise authorize any AI infused application or tool to any application, service or data via API, OAUTH, OAUTH2 or any other means of authentication, authorization or delegation without fully understanding what data can be collected, how the data may be used and who retains exclusive rights to the data. Data collected by AI is usually used in training, the data can then be used to generate output. This puts copyright, intellectual property and private data at risk of disclosure and use by other organizations. Never store PI, PHI or IP in applications that you gave granted access or delegated access to AI tools.

Shadow IT Policies

Shadow IT is the information technology (IT) systems installed by departments other than the central IT department, to work around the perceived or real deficiencies of the central information systems.

  • Do not independently and without authorization subscribe to any cloud based services or store, upload or transfer data or otherwise conduct business without approval and oversight.
  • If you wish to use a tool that is not part of the standard IT tools, contact the help desk for information on how to obtain approval and authorization to use the application or service.
  • Do not use non-organizational approved e-mail systems, data storage repositories, data transfer services, CRM, ERP or accounting systems or personal devices or accounts.
  • All new projects with any IT components involved must be vetted by the IT department and screened for privacy and security issues that may arise.

Financial Transactions Policies

Create a policy that dictates what is required to initiate financial transactions as well as make changes to existing transaction accounts. The policy should take into account the following:

  • Never accept account changes that originate from e-mail, voice mail, text, chat, video conferences or other electronic communiques. Always use an outbound verification method whereby you initiate a voice call to the recipient contact (to a known, trusted and verified phone number) and have a verbal confirmation to confirm any changes to account numbers or methods of payment.
  • Have more than one person involved in validating financial transactions over a predetermined amount. The higher the amount, the more scrutiny should be applied.
  • Use a security token to initiate financial transfers if the bank provides such a mechanism.
  • Disable on-line wire transfers if you do not use them.
  • Build a relationship with your bank officer so they know your financial routines and can contact you if they spot an anomaly.
  • Ensure that your email accounts have MFA and let your vendors and clients know that you do not make or accept financial account changes via email. Send a copy of your written financial policies to your clients and vendors so that they are aware of how you make and accept changes to financial accounts.
  • Train your employees on fraud prevention, especially those that manage financial accounts. Provide them a written copy of your financial transactions policies to sign.
error: Sorry, copy/paste is disabled
Skip to content