{"id":188,"date":"2021-01-11T12:20:25","date_gmt":"2021-01-11T18:20:25","guid":{"rendered":"https:\/\/www.axigent.net\/blog\/?p=188"},"modified":"2021-01-11T12:20:25","modified_gmt":"2021-01-11T18:20:25","slug":"security-compliance-policies-part-2","status":"publish","type":"post","link":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/","title":{"rendered":"Security Compliance Policies- Part 2"},"content":{"rendered":"\n<p> As we started discussing a few weeks ago, information security is a key component of keeping your company\u2019s data secure. Security policies include processes for accessing and handling information, whether on-site or remotely. Here are some more security policies that you should have in place for your business.<\/p>\n\n\n\n<p><strong>Account and Password Policy<\/strong><br>More than just setting minimum password requirements such as length and complexity, this policy should define the different types of accounts, their use and management lifecycle, and any additional controls to be used such as one-time passwords (OTP) or multi-factor authentication (MFA).<\/p>\n\n\n\n<p><strong>Security Logging Policy<\/strong><br>Centralized logging is essential to monitoring, response, and investigation during security incidents. Implementing a sound logging policy and strategy prior to a security incident can make response and mitigation much more effective.<\/p>\n\n\n\n<p><strong>Endpoint Security Policy<\/strong><br>This policy defines the minimum security controls that will be put in place on a company\u2019s endpoints. Providing a sound endpoint security solution and strategy can be one of the most effective ways to reduce the risk of a successful attack.<\/p>\n\n\n\n<p><strong>Vulnerability Management Policy<\/strong><br>Vulnerability management is essential to understanding your organization\u2019s risk posture as well as how effective system and device patching processes are.<\/p>\n\n\n\n<p><strong>Mobile Device Management and Access Policy<\/strong><br>Mobile device management and access policy are absolutely essential for any company that has a mobile workforce, and it can be critical to ensure secure remote access. This policy defines what types of devices can access a company\u2019s resources and what minimum controls are required for authorization.<\/p>\n\n\n\n<p>Developing your company\u2019s security posture can be challenging. Let Axigent ease the burden by allowing you to rely on experts with extensive industry experience. We can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we started discussing a few weeks ago, information security is a key component of keeping your company\u2019s data secure. Security policies include processes for accessing and handling information, whether on-site or remotely. Here are some more security policies that you should have in place for your business. Account and Password PolicyMore than just setting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[6,5,7,9,8,11,10],"class_list":["post-188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-amarillo-computer-company","tag-computer-company","tag-computer-company-near-me","tag-information-technology","tag-managed-it","tag-managed-it-company","tag-managed-it-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Compliance Policies- Part 2 - Blog<\/title>\n<meta name=\"description\" content=\"Axigent share more security policies that you should have in place for your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Compliance Policies- Part 2 - Blog\" \/>\n<meta property=\"og:description\" content=\"Axigent share more security policies that you should have in place for your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Axigent\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-11T18:20:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/Security-Compliance-Policies-Part-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tenai Hensley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Axigent\" \/>\n<meta name=\"twitter:site\" content=\"@Axigent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tenai Hensley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/\"},\"author\":{\"name\":\"Tenai Hensley\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\"},\"headline\":\"Security Compliance Policies- Part 2\",\"datePublished\":\"2021-01-11T18:20:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/\"},\"wordCount\":320,\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Security-Compliance-Policies-Part-2.jpg\",\"keywords\":[\"Amarillo Computer Company\",\"Computer Company\",\"Computer Company Near Me\",\"Information Technology\",\"Managed IT\",\"Managed IT Company\",\"Managed IT Services\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/\",\"name\":\"Security Compliance Policies- Part 2 - Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Security-Compliance-Policies-Part-2.jpg\",\"datePublished\":\"2021-01-11T18:20:25+00:00\",\"description\":\"Axigent share more security policies that you should have in place for your business.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Security-Compliance-Policies-Part-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Security-Compliance-Policies-Part-2.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Compliance Policies- Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"name\":\"Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\",\"name\":\"Blog\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"width\":269,\"height\":78,\"caption\":\"Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Axigent\",\"https:\\\/\\\/x.com\\\/Axigent\",\"https:\\\/\\\/instagram.com\\\/Axigent\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\",\"name\":\"Tenai Hensley\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/author\\\/tenai\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Compliance Policies- Part 2 - Blog","description":"Axigent share more security policies that you should have in place for your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Security Compliance Policies- Part 2 - Blog","og_description":"Axigent share more security policies that you should have in place for your business.","og_url":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/Axigent","article_published_time":"2021-01-11T18:20:25+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/Security-Compliance-Policies-Part-2.jpg","type":"image\/jpeg"}],"author":"Tenai Hensley","twitter_card":"summary_large_image","twitter_creator":"@Axigent","twitter_site":"@Axigent","twitter_misc":{"Written by":"Tenai Hensley","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#article","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/"},"author":{"name":"Tenai Hensley","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85"},"headline":"Security Compliance Policies- Part 2","datePublished":"2021-01-11T18:20:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/"},"wordCount":320,"publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/Security-Compliance-Policies-Part-2.jpg","keywords":["Amarillo Computer Company","Computer Company","Computer Company Near Me","Information Technology","Managed IT","Managed IT Company","Managed IT Services"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/","url":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/","name":"Security Compliance Policies- Part 2 - Blog","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#primaryimage"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/Security-Compliance-Policies-Part-2.jpg","datePublished":"2021-01-11T18:20:25+00:00","description":"Axigent share more security policies that you should have in place for your business.","breadcrumb":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#primaryimage","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/Security-Compliance-Policies-Part-2.jpg","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/Security-Compliance-Policies-Part-2.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.axigent.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Compliance Policies- Part 2"}]},{"@type":"WebSite","@id":"https:\/\/www.axigent.net\/blog\/#website","url":"https:\/\/www.axigent.net\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axigent.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axigent.net\/blog\/#organization","name":"Blog","url":"https:\/\/www.axigent.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","width":269,"height":78,"caption":"Blog"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Axigent","https:\/\/x.com\/Axigent","https:\/\/instagram.com\/Axigent"]},{"@type":"Person","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85","name":"Tenai Hensley","url":"https:\/\/www.axigent.net\/blog\/author\/tenai\/"}]}},"_links":{"self":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":1,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/188\/revisions\/190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media\/189"}],"wp:attachment":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}