Does your business have an acceptable use policy (AUP) regarding the use of your organization’s network, devices, and the Internet? Is the policy actively enforced, or is it a document that’s only seen upon the point-of-hire? There are many reasons why your company needs an AUP, and why the document needs to play a bigger role in corporate governance.
Why have an Acceptable Use Policy?
Having a cybersecurity plan is more critical than ever. With the number and intensity of cyber attacks increasing, it is paramount that all companies — regardless of size — understand current cyber threats and what to do to prevent and combat them.
A crucial component of this cybersecurity plan is an acceptable use policy. The acceptable use policy serves many key functions:
The key to successful AUP adoption
It is far better to layout acceptable usage and get employees on board early than to have to spend cycles correcting behaviour and problems if something goes wrong. In a worst-case scenario, a staff member could introduce ransomware into the corporate environment simply by visiting a site that would have been blacklisted if you had an AUP in place, or sharing passwords in a public space. To be successful, your policies should be:
What should your AUP Include? Read our Threat Insight for more information and ways to level up your AUP now.