Security Policies & Plans
  1. Master Cybersecurity Policy
  2. Acceptable Use Policy (AUP)
  3. Password Policy
  4. Bring-Your-Own-Device (BYOD) Policy
  5. Remote Working Policy
  6. Incident Response (IR) Plan & Playbooks
  7. Disaster Recovery Plan (DRP)
  8. Business Continuity Plan (BCP)
  9. Data Handling Policy
  10. Records Management Policy
  11. Privacy Policy
  12. Data Breach Policy
Physical Security
  1. Cable Locks
  2. Visitor Logs
  3. Privacy Filters
  4. Security Cameras
  5. Clear Desks & Clear Screens
Personnel Security
  1. Screening & Background Checks
  2. Onboarding & Offboarding
  3. Non-Disclosure Agreements (NDA)
  4. Separation of Duties
  5. Job Rotation
  6. Dual Authorization
  7. Mandatory Vacations
  8. Return of Assets Policy
  9. Law Enforcement & Cybercrime Hotlines
Network Security
  1. Router & Access Point Security
  2. Wi-Fi Security Standards
  3. Network Segmentation
  4. Content Filtering
  5. Virtual Private Network (VPN)
Device & Application Security
  1. BIOS/UEFI Security Measures
  2. System Firmware Updates
  3. Windows System Hardening
  4. Linux System Hardening
  5. Point of Sale (POS) Systems
  6. Internet of Things (IoT)
  7. Legacy Infrastructure
  8. Kiosk Systems
  9. System Performance Optimization
  10. Web Browser Hardening
  11. Anti-Malware Software
  12. EDR & XDR
  13. Application Whitelisting
  14. File Integrity Monitoring (FIM)
  15. Updates & Patches
  16. Cloud File Sharing/Storage Platforms
  17. Company Websites
  18. E-Commerce
  19. Social Media Platforms
  20. Video Conferencing Tools
Identity & Access Management
  1. Multifactor Authentication (MFA)
  2. Password Managers
  3. Passwordless Authentication
  4. Conditional Access
  5. Account Lockout
Data Security & Governance
  1. Data Encryption
  2. Data Loss Prevention (DLP)
  3. Data Sanitization & Disposal
  4. Data Masking & Steganography
Security Operations Management
  1. Event Logging
  2. Security Information & Event Management (SIEM)
  3. Vendor & Supply Chain Security
  4. Configuration Management
  5. High Availability
  6. Backup Solutions
  7. Alternate Sites