Author Archives: David Lineman

Policies on Social Networking at Work

A recent study showed that over 75% of workers aged 20-30 access social networking sites [...]

Security Policy Controls for Home-based Employee Access

Attackers follow the weakest link The never-ending battle to secure the corporate desktop against viruses, [...]

Welcome to the Information Security Policy Weblog

The Information Security Policy Weblog is published by Information Shield. We provide this weblog (aka [...]

Critical Security Policies for Preventing Cyber Attacks

Is it possible to declare some security policies as more critical than others? When it [...]

Effective Security Policy Management – Part 7

Part 7. A Written Exception Process It may be impossible for every part of the [...]

Effective Security Policy Management – Part 6

Part 6. A Verified Audit Trail Security policy documents will not be effective unless they [...]

Effective Security Policy Management – Part 5

Part 5. An Effective Date Range Written information security policies should have a defined “effective [...]

Effective Security Policy Management – Part 3

Part 3. Defined Management Structure To help keep information security policies readable and manageable, it [...]