Course Content
Knowledge check & certification
0/1
Cybersecurity 101

๐Ÿ“˜
Module 6 ยท Lesson 6.1
Company security policy overview
Security policies explain how we protect company systems, customer environments, and sensitive information. They are the rules that turn good intentions into consistent, safe action.
Always watching. Always protecting.

๐Ÿงญ
Sets expectations
Policies define what is required, what is prohibited, and what to do when unsure.
๐Ÿ›ก๏ธ
Reduces risk
Clear rules help prevent mistakes, misuse, data loss, and security incidents.
โœ…
Supports compliance
Policies help meet contractual, legal, privacy, and audit obligations.

๐Ÿ“–
What is a security policy?

A company security policy is a formal set of rules and expectations for protecting systems, devices, accounts, data, and customer environments.

It explains how employees should use company resources, how access is controlled, how sensitive information is handled, and how incidents are reported.

In simple terms: security policies tell us how to work safely and consistently.

๐Ÿข
Why company security policy matters

At Sirix, our work can affect real customer sites, real operations, and real people. Policies help make sure actions are consistent, authorized, and defensible.

  • They protect customer data and company systems.
  • They reduce confusion during day-to-day work and incidents.
  • They support accountability by defining approved behavior.
  • They help the company meet privacy, contractual, and audit requirements.

๐Ÿงฉ
What company security policies usually cover
  • Acceptable use: how company devices, systems, and tools may be used.
  • Access control: role-based access, least privilege, and account responsibilities.
  • Password and MFA requirements: how credentials must be protected.
  • Data handling: how sensitive data is stored, shared, and protected.
  • Incident reporting: what must be reported and how quickly.
  • Remote work and device security: expectations for working safely offsite.

๐Ÿ™‹
What employees are expected to do
  • Read and follow company security rules and procedures.
  • Use systems only for approved business purposes.
  • Protect accounts, devices, and customer information.
  • Report suspicious activity, mistakes, or incidents quickly.
  • Ask when unsure instead of guessing or bypassing controls.
โ›”
What policies are meant to prevent
  • Unauthorized access or account sharing
  • Unsafe shortcuts that bypass verification or approval
  • Improper handling of customer or internal data
  • Delayed reporting of suspicious activity or incidents
  • Use of unapproved tools, apps, or personal channels for work

โš™๏ธ
What policy looks like in everyday work

Security policy is not separate from your job. It shows up in everyday decisions, including:

  • Using only your assigned account and approved access
  • Verifying requests before unlocking, disabling alarms, or sharing data
  • Locking your workstation and protecting active sessions
  • Using approved storage and communication tools
  • Reporting phishing, suspicious logins, lost devices, or mistakes immediately
Simple rule: If an action feels outside policy, outside your role, or outside the normal process, pause and verify before proceeding.

โ“
If you are unsure what policy requires
  • Pause before taking action.
  • Check the relevant policy, procedure, or job guidance.
  • Ask your lead, Security, or IT for direction.
  • Report if the situation may already involve a mistake, exposure, or incident.

Policies are there to guide decisions โ€” not to trap people. Asking questions early is good security behavior.

๐Ÿ’ฌ
Quick scenario
A coworker asks you to use your account to complete a quick task for them because their access is not working and they say it is urgent.
Correct response: Do not share your account or perform the action on their behalf unless the approved process allows it. Follow company policy, direct them to the proper access/request path, and escalate if needed.

โญ
Key takeaway

Company security policy exists to protect people, systems, customer environments, and trust. Know the rules, follow the approved process, and ask when unsure.

When in doubt: Pause. Check policy. Ask. Report.

Always watching. Always protecting.