Cyber Security policy

Purpose/scope

To establish and maintain a secure computing and information environment for the organization, its clients, and suppliers, and to protect against unauthorized access, loss, or damage. This policy applies to all employees, contractors, consultants, and other workers at the organization, as well as any third-party representatives accessing our systems.

Data Classification

Confidential: Information whose unauthorized disclosure may harm the organization or its clients.

Internal: Information restricted to company personnel and designated stakeholders.

Public: Information intended for public view.

User Access Controls

User Registration: All users must be registered with IT to access company systems.

Password Policy: All users must adhere to strong password practices (e.g., minimum length, complexity).

Multi-factor Authentication (MFA): MFA is required for accessing sensitive systems.

Network Security

Firewalls: Ensure all company networks are protected with adequately configured firewalls.

VPN: Remote access to the company network requires a secure VPN connection.

Device and Endpoint Security

Anti-Malware: All devices connected to the network must have up-to-date anti-malware software.

Patch Management: Regularly update all software and systems to patch vulnerabilities.

Incident Response

Reporting: All suspected security breaches should be reported immediately.

Investigation: An incident response team will investigate and manage the situation.

Backup and Recovery

Backup Frequency: Critical data will be backed up daily.

Data Restoration: Data restoration tests will be conducted quarterly.

Third-Party Access

Assessment: Assess cybersecurity practices of third-party suppliers and partners.

Data Sharing: Use encrypted methods to share sensitive data with third parties.

Training and Awareness

Regular Training: Conduct bi-annual cybersecurity awareness training for all staff.

Phishing Tests: Periodically conduct mock phishing tests to educate staff about email threats.

Compliance and Auditing

Regulatory Compliance: Adhere to global and regional data protection regulations.

Annual Audits: Conduct internal and external security audits annually.

Physical Security

Ensure data centers and server rooms have restricted access and are monitored.

Policy Review

This policy will be reviewed annually or after any significant incident.


TRANS-IT PORTAL