3-page policy on cybertage (cyber sabotage).
In common with many other insider threats and fraudsters, cyberteurs exploit weaknesses and gaps in our information security arrangements. Aside from reinforcing the value of general information security controls, this policy requires some additional controls to address cybertage specifically, including ‘zero tolerance’. Cyberteurs who attempt to compromise the organization can anticipate a decisive and robust response from management.
Delivered as an editable MS Word document, easily customized for your organization's specific needs.