Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
FUTO Visits Our Office
Your New Bank Account
14.3 – Policy Troubleshooting
After the security policy has been in the organization for some period of time – that can be anywhere from three months to a year, depending on the organization, the organization information security controls should be checked against the applicable policies. Ensure that each policy is being adhered to, as proposed, and is still applicable […]
14.2 – Policy Types & Standards
Simply put, creating security policies is not easy. The procedure of getting a security policy is expensive, difficult and time-consuming. Usually organizations have two choices: To write a custom policy, hire a security professional for your organization. To write by yourself, you can use purchased guides or resources found on the internet. The first option […]
14.1 – Policy Development – Process & Lifecycle
Policy Development Process includes the following: Develop policies that you plan to implement: A policy that you are unable or unwilling to implement is useless. If your policy states that internet usage is strictly allowed to conduct office related work, but you do not block website access or have the competency to monitor internet activity […]






