If you want to keep your network free of certain applications, such as Skype, your policy must clearly state that...
they are prohibited. It must also present the penalties for any employee found using them.
It's always helpful to state why certain rules and restrictions are in place. Use of a particular application, for example, could slow down the network for essential tasks and communications. I'd back this up with graphs or statistics showing the effect certain apps have on the availability of bandwidth. People are far less likely to circumvent or ignore policy rules if they understand the logic behind them.
Just having a policy, however, is not enough. To make policy enforcement the norm within an organization, you must be able to detect and punish violators, and this requires technology. There's an abundance of products to choose from that control users' network activities. I personally like Web security gateways, such as the Web Security Gateway from Websense Inc. Deploying this type of technology, along with sensible rules, will manage your data and control employees so that your organization can benefit from social networking tools while avoiding many of the dangers. A tool like Microsoft's Windows SteadyState can also help system administrators control what users can and can't do, such as access programs, configuration settings, removable storage devices and websites.
A security policy is essential to manage how enterprise resources, like bandwidth, are used as it's the document that binds all of your security controls together, making sure they complement and strengthen each other. Failure to enforce your policy and apply the stated penalties, however, will render it moot. This is why you need to back it up with technology to not only monitor any misuse, but also to preempt any attempted misuse, either intentional or through simple oversight.
For more information:
Related Q&A from Michael Cobb
Expert Michael Cobb explains how password change frequency and reuse for third-party apps should be addressed in enterprise password policies.continue reading
Learn how a Web-based free spam-filtering service can secure email and prevent spam from attacking your enterprise.continue reading
Do you know some of the best third-party patch deployment tools? See expert Michael Cobb's recommendations on which tools would work best for your ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.