+61-2-9434-5000

How to create an
effective acceptable
use policy

The rapid shift to remote working as a result of the COVID-19 pandemic has led to an increase in cybersecurity risks and attacks. Having the right policies in place can help keep your organization safe. One key policy that companies should have in place is an effective acceptable use policy (AUP). This policy sets clear boundaries on what is acceptable behavior for using company resources and data. Combining a strong AUP with proper training can help create a secure foundation for your organization. Here are some tips to get you on your way: 

Create guidelines for appropriate use of company resources. Set the ground rules for how employees can use corporate devices, like laptops and smartphones. Decide what, if any, personal use you will permit, such as social media. And determine how corporate data can be accessed and shared.

Ensure operating systems are up to date. An out-of-date operating system (OS) makes your system more vulnerable and susceptible to attacks. When an OS is outdated, it’s likely your apps are as well. Establish expectations for your employees to keep their OS and apps updated. 

Limit your apps to what’s company approved. Apps are another way your data can be compromised. Hackers can enter your system through mobile apps, even including well known business apps. Forty-three percent of companies prohibit their employees from using apps that aren’t from the company or an official app store.1 Limit your employee app installation on company devices to app stores and company-sanctioned sites.

Remind employees to be vigilant against phishing. With employees working from home, it’s easy to use mobile devices to respond to emails. However, mobile users are three times more vulnerable to a phishing attack than those on other devices.2 Set guidelines for your employees to be vigilant against phishing and report its occurrence.

Secure BYOD together with company-owned devices. Whether your business follows a bring-your-own-device (BYOD), corporate-owned but personally enabled (COPE) or other device-enablement policy, be sure that all devices accessing corporate data are secure. Remind employees working remotely that it is their responsibility to protect company systems and data regardless of what device they use to access them.

By simply following these tips, your AUP will be stronger and your employees will have the necessary tools to keep your business threat ready.

To learn more about how Verizon can help you enhance your security, contact your Verizon Wireless business specialist or explore the links below.


Additional help:

Verizon mobile device management
Verizon Mobile Security Index
Verizon AUP Guide
Verizon Data Breach Investigations Report

1Verizon 2020 Mobile Security Index

2https://s3.amazonaws.com/files.appannie.com/reports/1901_State_of_Mobile_Main_EN.pdf