Specialist Security & Risk Management Consultants

Information Protection Policy – Template for Free Download

An information protection policy is essential for your business.

An information protection policy is essential for your business.

Almost every business, what ever its size and function, handles sensitive data. This can range from a list of your customers and their addresses, to full-blown business intelligence systems that track their trends.

However you manage your customers, it is essential that you have a robust, well thought out Information Protection Policy in place. To help you develop this, we have made an Information Protection Policy template available for free download, that cover the main topics. This will allow you to concentrate on developing the robust protection necessary rather than spend time working out on how to document it.

This template is also ideal (and based on widely used formats) for local government authorities who need to produce suitable documentation.

Similar posts
  • AV is not dead – it just has li... Antivirus (AV) has been around for decades now and this is both a good and bad thing. On one hand, AV is so well known most people already understand that they need to have it. But on the other, all the attackers know about it. This means the first step in pretty much every attack [...]
  • Supplier Security – A lesson fo... Supplier security is something most organisations are at least aware of, and lots actually realise they need to do something about it. However, most of the time, “doing something” about it involves a quick chat with the supplier, possibly a generic check-list and a review that the contract at least mentions security. The problem is thinking [...]
  • Phishing and Malware – FedEx mi... It seems that every day, new script kiddies discover the likes of the Social Engineering Toolkit or Metasploit and launch a new wave of phishing attacks. Unfortunately it seems that this time the attackers are too lazy to even try. Today’s email – screenshot on the right – is a reasonably straight forward phishing attempt. The [...]
  • Finphishing – 8 steps to crimin... FinPhishing – or financial spear phishing – is a form of social engineering attack which is becoming massively profitable for the criminal enterprises involved. Unfortunately for the victims it is very cheap to deploy and nearly always gets past technological security controls such as spam filtering and malware detection. As a result of this, businesses [...]
  • Security breaches – do you know... One sad fact about security is that no matter what controls you put in place, you will suffer breaches and if you are on the internet it is likely to happen sooner rather than later. People sometimes hold to a “physical world” security model which has a clearly defined threat actor (e.g. a burglar) casing [...]

Recent Tweets Recent Tweets