Policy brief & purpose-

    Our company cyber security policy outlines our guidelines and provisions for preserving the

    security of our data and technology infrastructure.

    The more we rely on technology to collect, store and manage information, the more

    vulnerable we become to severe security breaches. Human errors, hacker attacks and

    system malfunctions could cause great financial damage and may jeopardise our company’s

    reputation.

    For this reason, we have implemented a number of security measures. We have also

    prepared instructions that may help mitigate security risks. We have outlined both provisions

    in this policy.

    Scope

    This policy applies to all our employees, contractors, volunteers and anyone who has

    permanent or temporary access to our systems and hardware.

     

    Policy elements

    Confidential data

    Confidential data is secret and valuable. Common examples are:

    Unpublished financial information

    Data of customers/partners/vendors

    Patents, formulas or new technologies

    Customer lists (existing and prospective)

    All employees are obliged to protect this data. In this policy, we will give our employees

    instructions on how to avoid security breaches.

    Protect personal and company devices

    When employees use their digital devices to access company emails or accounts, they

    introduce security risk to our data. We advise our employees to keep both their personal and

    company-issued computer, tablet and cell phone secure. They can do this if they:

    Keep all devices password protected.

    Choose and upgrade a complete antivirus software.

    Ensure they do not leave their devices exposed or unattended.

    Install security updates of browsers and systems monthly or as soon as updates are

    available.

    Log into company accounts and systems through secure and private networks only.

    We also advise our employees to avoid accessing internal systems and accounts from other

    people’s devices or lending their own devices to others.Company cyber security policy

    Version 1 13/08/2018 2/3

    When new hires receive company-issued equipment they should follow instructions to

    protect their devices and refer to our IT Consultants if they have any questions.

    Keep emails safe

    Emails often host scams and malicious software (e.g. worms.) To avoid virus infection or

    data theft, we instruct employees to:

    Avoid opening attachments and clicking on links when the content is not adequately

    explained (e.g. “watch this video, it’s amazing.”)

    Be suspicious of clickbait titles (e.g. offering prizes, advice.)

    Check email and names of people they received a message from to ensure they are

    legitimate.

    Look for inconsistencies or give-aways (e.g. grammar mistakes, capital letters,

    excessive number of exclamation marks.)

    If an employee isn’t sure that an email they received is safe, they can refer to our IT

    Consultants.

    Manage passwords properly

    Password leaks are dangerous since they can compromise our entire infrastructure. Not only

    should passwords be secure so they won’t be easily hacked, but they should also remain

    secret. For this reason, we advice our employees to:

    Remember passwords instead of writing them down. If employees need to write their

    passwords, they are obliged to keep the paper or digital document confidential and

    destroy it when their work is done.

    Exchange credentials only when absolutely necessary. When exchanging them in-

    person isn’t possible, employees should prefer the phone instead of email, and only if

    they personally recognise the person they are talking to.

    Our IT Consultants manage our passwords via password management tool which generates

    and stores passwords. Employees are not to change passwords themselves, all password

    changes are to go through the IT Department.

    Transfer data securely

    Transferring data introduces security risk. Employees must:

    Avoid transferring sensitive data (e.g. customer information, employee records) to

    other devices or accounts unless absolutely necessary. When mass transfer of such

    data is needed, Senior Management approval is mandatory.

    Share confidential data over the company network/ system and not over public Wi-Fi

    or private connection.

    Ensure that the recipients of the data are properly authorised people or organisations

    and have adequate security policies.

    Report scams, privacy breaches and hacking attempts

    Our IT Consultants need to know about scams, breaches and malware so they can better

    protect our infrastructure. For this reason, we advise our employees to report perceived

    attacks, suspicious emails or phishing attempts as soon as possible to the IT Department.Company cyber security policy

    Version 1 13/08/2018 3/3

    Our IT Consultants must investigate promptly, resolve the issue and send a companywide

    alert when necessary.

    Our IT Consultants are responsible for advising employees on how to detect scam emails.

    We encourage our employees to reach out to them with any questions or concerns.

    Additional measures

    To reduce the likelihood of security breaches, we also instruct our employees to:

    Turn off their screens and lock their devices when leaving their desks.

    Report stolen or damaged equipment as soon as possible to Management.

    Change all account passwords at once when a device is stolen.

    Report a perceived threat or possible security weakness in company systems.

    Refrain from downloading suspicious, unauthorised or illegal software on their

    company equipment.

    Avoid accessing suspicious websites.

    We also expect our employees to comply with our social media and internet usage policy.

    Our IT Consultants should:

    Install firewalls, anti malware software and access authentication systems.

    Arrange for security training to all employees.

    Inform employees regularly about new scam emails or viruses and ways to combat

    them.

    Investigate security breaches thoroughly.

    Follow this policies provisions as other employees do.

    Our company will have all physical and digital shields to protect information.

    Disciplinary Action

    We expect all our employees to always follow this policy and those who cause security

    breaches may face disciplinary action:

    First-time, unintentional, small-scale security breach: We may issue a verbal warning

    and train the employee on security.

    Intentional, repeated or large scale breaches (which cause severe financial or other

    damage): We will invoke more severe disciplinary action up to and including

    termination.

    We will examine each incident on a case-by-case basis.

    Additionally, employees who are observed to disregard our security instructions will face

    progressive discipline, even if their behaviour hasn’t resulted in a security breach.

    Take security seriously

    Everyone, from our customers and partners to our employees and contractors, should feel

    that their data is safe. The only way to gain their trust is to proactively protect our systems

    and databases. We can all contribute to this by being vigilant and keeping cyber security top

    of mind.

     Contact Us

    For any questions or concerns, please contact:

    Phone: (02) 40050141
    Email: support@digikat.com.au
    Mailing Address: 82/84 Brisbane St, Tamworth NSW 2340