
Security Policies & Plans
- Master Cybersecurity Policy
- Acceptable Use Policy (AUP)
- Password Policy
- Bring-Your-Own-Device (BYOD) Policy
- Remote Working Policy
- Incident Response (IR) Plan & Playbooks
- Disaster Recovery Plan (DRP)
- Business Continuity Plan (BCP)
- Data Handling Policy
- Records Management Policy
- Privacy Policy
- Data Breach Policy
Physical Security
Personnel Security
- Screening & Background Checks
- Onboarding & Offboarding
- Non-Disclosure Agreements (NDA)
- Separation of Duties
- Job Rotation
- Dual Authorization
- Mandatory Vacations
- Return of Assets Policy
- Law Enforcement & Cybercrime Hotlines
Network Security
- Router & Access Point Security
- Wi-Fi Security Standards
- Network Segmentation
- Content Filtering
- Virtual Private Network (VPN)
Device & Application Security
- BIOS/UEFI Security Measures
- System Firmware Updates
- Windows System Hardening
- Linux System Hardening
- Point of Sale (POS) Systems
- Internet of Things (IoT)
- Legacy Infrastructure
- Kiosk Systems
- System Performance Optimization
- Web Browser Hardening
- Anti-Malware Software
- EDR & XDR
- Application Whitelisting
- File Integrity Monitoring (FIM)
- Updates & Patches
- Cloud File Sharing/Storage Platforms
- Company Websites
- E-Commerce
- Social Media Platforms
- Video Conferencing Tools
Identity & Access Management
- Multifactor Authentication (MFA)
- Password Managers
- Passwordless Authentication
- Conditional Access
- Account Lockout
Data Security & Governance
- Data Encryption
- Data Loss Prevention (DLP)
- Data Sanitization & Disposal
- Data Masking & Steganography
