Documented policies and procedures take the guess work out of information security and enable an organization to manage business risk.

Without documented policies and procedures each and every employee and contractor will act in accordance with their own perception of acceptable use and system management will be ad-hoc and inconsistent at best.  Staff will be unaware whether they are acting within the organization’s best interest.

Cyber-attacks against organizations are increasing both in number and sophistication and you must ensure your systems can be protected against these threats. The first step in achieving this is to document the rules and guidelines around system management, operation and use.

Let us help you draft your IT security-related policies and your disaster recovery plan.