Category Archives: acceptable use policy

New IRS Cyber Security Plan Template simplifies compliance

The IRS now requires that every tax preparer that files electronic returns must have a Cyber Security Plan in place.  For months our customers have asked us to provide a quality solution that (1) Addresses key IRS Cyber Security requirements and (2) is affordable for a small office.   Today we announced the release of our […]

Shadow IT – Security Policy Pillars

Many of our Information Shield customers are asking how to address “Shadow IT” within their information security policy programs.    In this article we will identify the common risks with unapproved IT devices and services and how to address them in your governance and security policy framework. What is “Shadow IT”? In short, “shadow IT’ is […]

New Guidance Requires Social Media Security Policies

In January 2013, the Federal Financial Institutions Examination Council (FFIEC) posted a set of proposed guidelines for financial institutions to maintain compliance in the world of social media.   The document entitled “Social Media: Consumer Compliance Risk Management Guidance,” includes a number of specific recommendations for financial institutions that must protect customer information.  The FFIEC security […]

Social Media Security Policies Lagging Adoption

In August of 2010, the social network IT Toolbox released their latest study on the use of mobile and social media technologies in the enterprise. The survey included over 2200 IT professionals from 109 different countries. One of the areas of the survey included questions about corporate guidance and security policies. While Social media use […]

Acceptable Use Policies to Reduce Risk

A few weeks ago, Deloitte Touche Tohmatsu (DTT) released the results of its Annual Global Security Survey for 2008. The survey focuses on the information security needs, practices and priorities of the financial industry, which is among the most regulated of all vertical markets. Not surprisingly, the top priority for the security officers interviewed was [...]