© 2019 IsecT Limited, New Zealand      Get in touch

3-page policy on cybertage (cyberspace sabotage).

 

In common with many other insider threats and fraudsters, cyberteurs exploit weaknesses and gaps in our information security arrangements.  Aside from reinforcing the value of general information security controls, this policy requires some additional controls to address cybertage specifically, including ‘zero tolerance’.  Cyberteurs who attempt to compromise the organization can anticipate a decisive and robust response from management.

 

Delivered as an editable MS Word document, easily customized for your organization's specific needs.

Cybertage policy

$15.00Price
  • Template policy on cybertage

     

    See also the policies on:

    • Information ownership
    • Information governance
    • Information risk management
    • Cybersecurity
    • Backups and archives

Content