Data and Network Security Checklist: Technology in Your Corner
Data and Network Security Checklist: Technology in Your Corner
Physical Security
Are your servers and data in a physically locked or restricted area?
If so, who has access and how?
Are laptops loaded with disk encryption and/or tracking software in the event they are lost or stolen?
Are the doors to your offices secure at night and on the weekends?
Data/Files
Where are your backups and how do they get where they are going?
Are your files and folder permissions on your servers secure and setup properly?
How do you store and transfer sensitive information with your clients?
Websites
Where is your website hosted?
Are you using SSL certificates for your website to ensure encrypted communication?
Data Loss/Theft
What is your data theft plan?
What is your policy for notifying your clients of a data breach/loss situation?
Encryption Policy
Defines which methods of data encryption can be used in an organization, as well as the recommended encryption
method(s). This type of policy is critical when it comes to compliances, to ensure data safety standards are clearly
understood and met by everyone on the network.
Privacy Policy
Details how information collected will be used, disclosed, stored and managed by the company receiving the
information.