Author Archives: David Lineman
Policies on Social Networking at Work
A recent study showed that over 75% of workers aged 20-30 access social networking sites [...]
Security Policy Controls for Home-based Employee Access
Attackers follow the weakest link The never-ending battle to secure the corporate desktop against viruses, [...]
Welcome to the Information Security Policy Weblog
The Information Security Policy Weblog is published by Information Shield. We provide this weblog (aka [...]
Critical Security Policies for Preventing Cyber Attacks
Is it possible to declare some security policies as more critical than others? When it [...]
Effective Security Policy Management – Part 7
Part 7. A Written Exception Process It may be impossible for every part of the [...]
Effective Security Policy Management – Part 6
Part 6. A Verified Audit Trail Security policy documents will not be effective unless they [...]
Effective Security Policy Management – Part 5
Part 5. An Effective Date Range Written information security policies should have a defined “effective [...]
Effective Security Policy Management – Part 3
Part 3. Defined Management Structure To help keep information security policies readable and manageable, it [...]