Tag: Best Practices
Exception Management Policy – Best Practices
There may be times that business operations require certain exceptions be made to information security policies and procedures. This article provides some guidance and best…
Wireless Access Security Policy – Best Practices
Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network….
Online Social Media Policy: Best Practices and Template
What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media…
Acceptable Use Policy: Best Practices and Template
An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other…
How To Prevent Application Vulnerabilities and Breaches
Any applications developed internally or outsourced should follow secure coding practices to prevent common vulnerabilities and potential data breaches. The application’s design and implementation should…
GDPR Explained In Plain English
What is the GDPR regulation and when did it passed? The EU General Data Protection Regulation, or GDPR for short, is a sweeping regulation passed…
Medical Device Security Best Practices
Medical devices improve health, quality of life, and even save lives. As such, medical device use must be appropriate for the context and setting in…
How To Implement Security Auditing and Logging
Generally accepted security auditing and logging practices should be adhered to ensure that the policies and procedures regarding compliance with the implementation specifications of certain…