Notes (Current Practices)
Please provide any additional comments you have in regard to this section.
Notes (Network & Systems Security)
Please provide any additional comments you have regarding network & systems security here.
Shadow Information Technology
Our organization works to limit "shadow" IT by ensuring staff have the tools they need to collaborate and work effectively,
Shadow IT is when staff use personal versions of tools like Dropbox, Google Drive and Slack without involvement or knowledge or organizational IT to work remotely and/or collaborate with colleagues in the manner that best supports their work.
Organizations can reduce shadow IT through policy and communication but most of all by leveraging cloud-based applications to provide staff with a high degree of flexibility to collaborate, work remotely and with various devices.
The organization periodically "phishes" its staff to determine vulnerability to common phishing tactics.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Notes (Staff Training & Support)
Please provide any additional comments you have in regard to the training and support section here.
Notes (Documentation & Policies)
Please provide any additional comments you have regarding the documentation & policies section here.