Early this week, security vendor Proofpoint released its fourth annual “Outbound E-Mail and Content Security in Today’s Enterprise” survey. The report concluded that smart organizations are increasingly creating specific acceptable-use policies to address security threats associated with employee use of consumer IT applications and services such as blogs, message board, Web mail and instant messages.“Clear, well-articulated policies and employee education are probably the number-one thing that CIOs can champion to ensure the security of all of their organizations’ sensitive content,” said Keith Crosley, director of market development for Proofpoint. The creation of effective acceptable-use policies for e-communications starts with brainstorming sessions and interviews with the appropriate personnel, including representatives from the executive suite, finance, legal, IT, security and human resources, according to Crosley. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Here are five questions that Crosley suggests asking once all the necessary parties are in the room. When is it OK to send information outside the enterprise via e-mail, blogs and message boards, IM and media sharing? When is it not? What types of information are prohibited in the e-mail system? Transactional data? Customer data? Intellectual property documents? Internal memos? What types of procedures will be necessary to discourage risky behavior and enforce established policies? Punishment? Termination? What is our process for reviewing and revising policies in the event that changes occur or policies fail to work as expected?Crosley also assembled a list of 10 steps for organizations to follow when crafting acceptable-use policies: Understand your business and what digital assets are important based upon what you do, what external forces drive your business, and what intellectual property you own. Don’t forget to think about “new media,” employee-generated content and new communications channels as you go through this exercise. Create policies that consider business assets, processes and employee access to files. Understand what your confidential/valuable information is and where it resides. Define risk and develop a list of possible security countermeasures. Evaluate security measures (physical and network-related) and potential technology solutions. Implement e-mail security technology, multi-protocol data loss prevention technology and “real-world” security processes. Many vendors (Proofpoint included) offer evaluations or audits that will help you understand which protocols are most risky and what types of sensitive information are flowing out of your organization. Monitor and enforce policy via security technology and human oversight. Conduct audits to analyze risk and identify trouble spots. Train the organization to recognize risks and refrain from insecure behaviors. Treat your policies as living documents that may change over time. Regularly evaluate the effectiveness and sensibility of your policies and make adjustments if necessary. Related content opinion The CIO event of the year: What to expect at CIO100 ASEAN Awards By Shirin Robert Sep 26, 2023 3 mins IDG Events IDG Events Events news Oracle bolsters distributed cloud, AI strategy with new Mexico cloud region The second cloud region in Monterrey, providing over 100 OCI services, is part of Oracle's plan to compete with AWS, Google and Microsoft, and cash in on enterprise interest in generative AI. By Anirban Ghoshal Sep 26, 2023 3 mins Generative AI Cloud Architecture Cloud Computing brandpost Zero Trust: Understanding the US government’s requirements for enhanced cybersecurity By Jaye Tillson, Field CTO at HPE Aruba Networking Sep 26, 2023 4 mins Zero Trust feature SAP prepares to add Joule generative AI copilot across its apps Like Salesforce and ServiceNow, SAP is promising to embed an AI copilot throughout its applications, but planning a more gradual roll-out than some competitors. By Peter Sayer Sep 26, 2023 5 mins CIO SAP Generative AI Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe