You Have Just Been Hired As The Security Manager Of A Medium

You Have Just Been Hired As The Security Manager Of A Medium Sized Fin

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an email policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Paper For Above instruction

Introduction

In today’s digital age, the security policies governing email usage and internet access are vital components of an organization’s overall security framework. For a medium-sized financial services company with 250 employees based in New Hampshire, establishing clear, effective, yet balanced policies is essential to safeguard sensitive information, maintain productivity, and ensure lawful compliance. This paper outlines proposed policies regarding employee email and internet usage, emphasizing the importance of balancing security with operational flexibility.

Employee Email Policy

The employee email policy aims to regulate the personal use of company email resources. While employees are encouraged to utilize email primarily for organizational communication, occasional personal use can be permitted within reasonable limits. The policy stipulates that all emails transmitted through the company’s email system are the property of the organization and may be monitored to ensure compliance with company policies and legal requirements.

Specifically, employees are prohibited from using company email accounts for transmitting illegal, malicious, or inappropriate content, including sexually explicit material, hate speech, or threats. Personal use should not interfere with work responsibilities nor consume excessive company resources. The company discourages the use of email for activities that could introduce security risks, such as clicking on suspicious links or downloading unknown attachments.

Furthermore, employees are advised to avoid sharing sensitive information via email unless secure protocols are used. It is recommended that employees use encryption when transmitting confidential data. The policy emphasizes that employees should not expect privacy in their email communications on company systems, and any email content may be subject to review.

Wi-Fi and Internet Usage Policy

The Wi-Fi and internet use policy establishes guidelines for safe and appropriate internet access within the company premises. The organization provides Wi-Fi connectivity to facilitate employee productivity but expects all users to adhere to security best practices and ethical standards.

Employees are permitted to use the internet for work-related tasks, with limited personal use that does not compromise network security or productivity. The policy strictly prohibits access to illegal content, such as pirated software, or engaging in activities that violate intellectual property rights. Users must avoid visiting malicious websites or downloading unapproved software that could introduce malware or viruses into the network.

To protect the organization’s digital assets, employees are required to follow security protocols such as using strong passwords, avoiding public Wi-Fi for sensitive transactions, and reporting any suspicious activity immediately. Access to certain high-risk websites may be restricted via content filtering tools.

The policy emphasizes that all internet activity may be monitored, logged, and reviewed for security and compliance purposes. Employees should have no expectation of privacy when using the company’s network or Wi-Fi resources. Violations of or failure to comply with these guidelines could result in disciplinary measures, including termination.

Balancing Policy Strictness and Flexibility

Setting the appropriate level of strictness in these policies involves considering the company’s operational needs and security risks. A balanced approach encourages responsible personal use without undermining security protocols. Given the sensitive nature of financial information, a somewhat strict policy might be justified, with clear enforcement measures and employee awareness campaigns. Conversely, overly restrictive policies could hinder employee morale and productivity.

Therefore, it is advisable to craft policies with explicit guidelines, support ongoing training, and implement monitoring techniques that are transparent and fair. Regular policy review is essential to adjust controls as threats evolve and organizational needs change.

Conclusion

Establishing comprehensive email and internet use policies is crucial for safeguarding a financial organization’s data and maintaining a secure working environment. By clearly defining acceptable behaviors and monitoring practices, the company can foster a culture of security awareness while allowing employees the flexibility to perform their duties effectively. Striking the right balance between security and leniency will contribute to both operational efficiency and risk mitigation.

References

  1. Andress, J. (2020). Cybersecurity for Beginners. Springer.
  2. CareerOneStop. (2022). Workplace cybersecurity policies. U.S. Department of Labor.
  3. Fernandes, T., et al. (2018). “Security policies and employee compliance in financial organizations.” Journal of Cybersecurity, 4(2), 77-89.
  4. ISO/IEC 27001:2013. Information security management systems — Requirements.
  5. Nasr, A., & Rose, S. (2019). “Balancing security and usability in employee internet policies.” Information Security Journal, 28(3), 126-132.
  6. OWASP Foundation. (2021). Security best practices for small and medium enterprises.
  7. Schneider, G. P. (2019). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
  8. Schneier, B. (2020). Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. W. W. Norton & Company.
  9. Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security. Cengage Learning.
  10. Wright, D., & Lemos, R. (2019). “Developing effective IT security policies within financial institutions.” Journal of Financial Crime, 26(2), 574-586.