3-page policy on cybertage (cyberspace sabotage).
In common with many other insider threats and fraudsters, cyberteurs exploit weaknesses and gaps in our information security arrangements. Aside from reinforcing the value of general information security controls, this policy requires some additional controls to address cybertage specifically, including ‘zero tolerance’. Cyberteurs who attempt to compromise the organization can anticipate a decisive and robust response from management.
Delivered as an editable MS Word document, easily customized for your organization's specific needs.
Template policy on cybertage
See also the policies on:
- Information ownership
- Information governance
- Information risk management
- Backups and archives