~3-page information security policy template on cybertage (cyber sabotage).
In common with many other insider threats and fraudsters, cyberteurs actively exploit weaknesses and gaps in information security arrangements. Aside from reinforcing the value of general information security controls, this unconventional policy requires some additional controls to address cybertage specifically, including ‘zero tolerance’. Cyberteurs who attempt to harm the organisation's information should expect a robust response from management.
By the way, this is an issue worth exploring throughout your supply network, particularly for critical infrastructure supplies such as power, transport, telecomms and Internet/cloud services. COVID has ably demonstrated the chaos caused by generalised disruption: imagine how things might have turned out for your organisation if its supply chain was actively and specifically targeted for some reason ... scary stuff!
Supplied as an MS Word document, readily customised for your organisation's specific situation.
top of page
bottom of page