Training and Awareness
- Recovering from a cyber security attack
- Securing your small business
- Is email secure?
- Top Malicious Attachment Types
- Identifying fake social media accounts
- All about passwords
Personnel Management
- Cyber Security Manager Role Description
- Cyber Security Human Resources Policy
- Account Approval Request Form
- Account Approval Process
- Remote Access Agreement
- Cyber Security Declaration - Board members
Registers & Logs
- Remote Access Register
- IT Asset Register
- Accounts Register
- Audit & Log file Activities spreadsheet
- Software Register
- Backup Register
Policies, Processes, Plans
- Example cyber incident customer notification
- Software Installation Policy - Template
- Social Engineering Awareness policy - template
- Security Response Plan policy - template
- Removable Media policy - template
- Remote Access policy - template