View on GitHub

Reprotec UK Ltd Policies Home Page

Home page for ISO and employee policies

Virus Protection Policy

Purpose

To establish requirements and practices which must be met by to ensure effective protection from malicious code, spam and spyware.

Scope

Applies to all employees of Opus Works.

Policy

Users should not disable Virus Protection and automatic update systems built into the computing device’s Operating System that they are using without consent from the ISMS Committee. For example, ensuring that Windows Defender remains enabled.

Operating systems which are known to be insecure and/or are out-of-support, such as Windows XP or Windows Vista must not be used as a general purpose computing platform. If their use is required, they should be run within a suitable sandbox by a competent operator. Example mechanisms of sandboxing include hypervisors, containers and / or network whitelisting and inspection.

All networks should be considered insecure and possibly hostile. Users must enable firewalls on all equipment and should seek to minimise the attack surface of their systems by disabling unused or uneccessary network services or protocols (e.g. telnet, SSH, ICMP).

Users should employ network egress and ingress monitoring tools on their workstations (e.g. Little Snitch on OSX, Zone Alarm Firewall on Windows) to ensure that they understand which programs on their workstations are connecting to the Internet and can make an informed decision as to whether to allow that communication to occur.

Opus Works uses a hosted email service which protects our users from unsolicited messages and malicious software.

Prevention of malicious code problems

Detection

Penalties

Employees found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Refer to Acceptable Use Policy and Disciplinary Policy.

back