Online Social Media Policy
Posted in Best Practices Compliance Program Policies & Procedures Security Program

Online Social Media Policy: Best Practices and Template

What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media…

Continue Reading... Online Social Media Policy: Best Practices and Template
Internet Use Policy
Posted in Best Practices Compliance Program Policies & Procedures Security Program

Internet Use Policy: Best Practices and Template

This article provides some insights and guidance on the best practices when developing an Internet Use Policy. You can you the information in this article…

Continue Reading... Internet Use Policy: Best Practices and Template
Acceptable Use Policy Best Practices
Posted in Best Practices Policies & Procedures Security Program

Acceptable Use Policy: Best Practices and Template

An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other…

Continue Reading... Acceptable Use Policy: Best Practices and Template
Access Control Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Access Control Best Practices

Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow…

Continue Reading... Access Control Best Practices
Antivirus Policy Best Practices
Posted in Best Practices How-To Policies & Procedures Security Tools & Solutions

Antivirus Policy and Procedure Best Practices

The primary purpose of the anti-virus solution or software is to guard against malicious software or scripts by blocking or quarantining this software that is…

Continue Reading... Antivirus Policy and Procedure Best Practices
BYOD Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Mobile Device or BYOD Security Best Practices

This article will provide some guidance and best practices for the use of, and security for, remote access and mobile device technology (e.g. BYOD) that…

Continue Reading... Mobile Device or BYOD Security Best Practices
Teleworking Policy Guidance for Healthcare Organizations
Posted in Best Practices Compliance Program Policies & Procedures

Teleworking Policy Guidance for Healthcare Organizations

The goal of this policy is to govern the controls and safeguards implemented for workforce members that are approved for teleworking activities. What should the…

Continue Reading... Teleworking Policy Guidance for Healthcare Organizations
Firewall Security Best Practices
Posted in Best Practices How-To Policies & Procedures Security Tools & Solutions

Common Firewall Security Best Practices

Firewall security devices, including routers and Intrusion detection and/or prevention systems, play a critical role in system of controls to prevent and detect unauthorized access…

Continue Reading... Common Firewall Security Best Practices