Solved

Security Policy for a small business

Posted on 2016-09-01
2
74 Views
Last Modified: 2016-09-01
I am looking for a security policy for a small business to use for their employees.
Are there any good templates to start from?
0
Comment
Question by:ie0
2 Comments
 
LVL 30

Accepted Solution

by:
Rich Weissler earned 500 total points
ID: 41779823
"Security Policy" covers a lot of ground.  I can suggest looking over the SANS Security Policy template library though.
0
 
LVL 63

Expert Comment

by:btan
ID: 41780024
I suggest your policy follows the ISO 27001 headings such as these but it may be quite non-trivial to cover all quickly - esp if you intend to make it simpler at the first place (for small set)
http://www.27001-online.com/secpols.htm

Otherwise, go specific for a "scoped" policies in area of main concern. Here is one comprehensive coverage of samples and toolkit for the various IT & cyber security scope
https://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Additional supplementary alternatives include
-Clean desk policy
-Computer and e-mail acceptable use policy
-Internet acceptable use policy
-Password protection policy
-Social media and blogging policies
-Personnel access/changes policy
http://www.csoonline.com/article/3019126/security/security-policy-samples-templates-and-tools.html

If you wanted a more clean cut to have small win or glimpse to poll the stakeholders, you may check out the attached (though can be quite old). It give some sensing on coverage and simple straight to the point mandates
NHS-CFH_Corporate-InfoSec-Policy-Tem.doc
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question