Hedge Fund Information Security Planning
In order to ensure that your hedge fund maintains a strong cybersecurity posture, it is essential that you enact the appropriate information security policies. But which policies should your firm be considering? In today’s post, we outline five important policies that should be part of your hedge fund’s information security plan.
Acceptable Use Policy
An Acceptable Use Policy defines acceptable use of equipment and computing services, and the appropriate employee security measures to protect the organization’s corporate resources.
An Email Policy defines the requirements for proper use of the company email system, and aims to make users aware of acceptable and unacceptable use of the email system.
Password Creation and Protection Policies
Password Creation and Protection Policies define the guidelines and best practices for the creation and maintenance of secure passwords.
Incident Response Plan Policy
Incident Response Plan Policies define the requirements for business units to develop and maintain security response plans.
Remote Access Policies
Remote Access Policies define standards for connecting to an organization’s network from any host or network external to the organization, as well as which type of remote desktop software can be used and how it must be configured.