Go to main menu Skip to main content Go to the bottom of the page
Homepage
    En / Fr

  • Manifesto
  • Cybersecurity Handbook
    • 1 _ 

      Sensitive Data

    • 2 _ 

      Passphrases

    • 3 _ 

      Accesses Management

    • 4 _ 

      How to Use a Secure Wi-Fi Connection

    • 5 _ 

      How to Tell If an Email Is Cool or Scam

    • 6 _ 

      BYOD

    • 7 _ 

      What Risks Do We Face on Social Media?

    • 8 _ 

      Privacy Settings

    • 9 _ 

      Backups & Archives

    • 10 _ 

      Cloud Security

  • Quiz
  • Cyber Policies
    • 1 _ 

      Security

    • 2 _ 

      Access

    • 3 _ 

      BYOD

    • 4 _ 

      Website Management

    • 5 _ 

      Backup & Archive

    • 6 _ 

      Legal

  • Glossary
  • Documents
    • Links
    • FAQ
    • Videos
  • Contact
  • Credits

Cyber Policies

1H

After going over the Cybersecurity Handbook chapters with your team, take a look at the Cyber Policies. Assign a policy manager (or a small team) to each policy. Each policy manager is invited to use the toolkit that has been designed especially for them and ensure that their cyber policy is indeed rolling. Good luck!

Policy 1 Security Policy All the policies
aami logo