Data Security Policy

May 17, 2019

DATA SECURITY POLICY. Risk Management Practice Guide of Lawyers Mutual. LAWYERS I LIABILITY INSURANCE COMPANY OF MUTUAL NORTH CAROLINA. INTERNAL THREAT 1. accidental deletion or dissemination of client's files 2. downloading malware or virus 3. exposing server and client files SECURITY AUDIT. Install virus protection software VISITOR & CONTRACTOR PROTOCOL Can office visitors or contractors access secure data PROTOCOL FOR EMPLOYEES LEAVING. If employee is leaving, lock down the data  OFFICE COMPUTERS & SERVERS Create an acceptable use policy for the workplace.

Spotlight

Security PS

Security PS is an information security consulting firm that helps businesses take on security challenges with confidence by addressing both immediate and long term needs. Our vendor independence, depth of experience, and commitment to proven best practices are leveraged on every engagement to bring the greatest value to our client's initiatives. Our services range from strategic to tactical, including: information security management program development, compliance, comprehensive security assessments, penetration testing, secure SDLC services, training, and more.

Other Infographics
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

Alarming Cyber Security Stats to Know for 2022 & Beyond

Infographic | June 7, 2022

The best way to achieve security is to implement proper controls in place, train well on cyber-security, and follow the recommended best practices.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

Crowdstrike Incident Response

Infographic | June 13, 2022

A modern approach to rapid response and recovery from today’s widespread security incidents. Navigating the best path through the labyrinth of a widespread ransomware attack will determine the organizational impact and recovery cost to the business.

Read More
news image

Infographic About Network Security

Infographic | April 1, 2021

According to a report, the cybersecurity workforce needs to grow 62% to meet the rising demand. The demand for security professionals is skyrocketing and shows no signs of stopping.

Read More

Spotlight

Security PS

Security PS is an information security consulting firm that helps businesses take on security challenges with confidence by addressing both immediate and long term needs. Our vendor independence, depth of experience, and commitment to proven best practices are leveraged on every engagement to bring the greatest value to our client's initiatives. Our services range from strategic to tactical, including: information security management program development, compliance, comprehensive security assessments, penetration testing, secure SDLC services, training, and more.

Events