Module 14

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

A few approaches for the development of cyber policies can be updating software and systems, conduct top to bottom security audits, and maintain industry compliance. Updating software can prevent many security issues that have occurred in the past or that have been discovered and patched. Not updating your software can leave you compromised to risks and more breach able software that can cause further issues. Conducting an audit should look not only at the software and hardware techniques you have in place to protect security but also at remote site personnel habits and to be sure you are in compliance with current security policies. Cybersecurity education should be a part of every new employee orientation, with new employees signing that they have read and understood the training. This can reduce workplace deviation and help the workplace grow as a whole if employees are educated more on polices and rules. They should be assessed and reviewed at least once a year This will also ensure that the training and policies are fresh in the employees mind. Maintaining compliance within the respected industry is important because you want to make sure you are following all rules and regulations so that you do not get in trouble and have potential loss to your company and/or business. Especially for companies in highly regulated industries like healthcare, insurance, and finance, these should be updated yearly or even monthly depending on the technology used. Employees should also know basic policies such as keeping passwords in a safe place instead of on their desk. Or giving another employee credential login information across an office while other employees can hear that information. People are a bigger reason for security breaches than the system software itself, often they compromise data in a way that they didn’t mean to by just being careless.

Leave a Reply

Your email address will not be published. Required fields are marked *