Customized Policies & Procedures for Your Cybersecurity Program

Any successful security program will include a set of policies and procedures. These can come in many forms, but the key component of security policies and procedures is documentation. Documentation helps ensure that your security policies and procedures are both understood and followed by all members of your organization. BARR’s Policy & Procedure Documentation services provide consultation resulting in a customized set of policies and procedures unique to your business. We do this by:

  • Evaluating which policies and procedures you currently have;
  • Determining what needs to be added or changed based on a gap assessment;
  • Adding or changing policies to meet your compliance requirements;
  • Getting approval from key members of your security and management teams;
  • Communicating the updated policies to your teams; and
  • Facilitating the implementation of policies with supporting procedures into your team’s regular job responsibilities.

Recent Blog Posts

One tip to boost password authentication security is to use a password manager, rather than a Post-it note next to your laptop.

Password Authentication: What It Is and How to Get the Most Out of It

| Cyber Hygiene, Data Privacy, Multifactor Authentication | No Comments

Password authentication and management—it’s something we can all agree is important, but it’s also something most of us find difficult to do. That’s why many of us create easy-to-remember passwords…

Webinar: Information Governance and Auditing in the Cloud. Logos: Kansas City chapter of the Institute of Internal Auditors, ISACA, Information Governance Group, and BARR Advisory

BARR Founder and President Co-presented Recent Webinar, Information Governance and Auditing in the Cloud

| Cyber Hygiene, Security | No Comments

BARR Advisory teamed up with the Kansas City chapter of the Institute of Internal Auditors (IIA), the Kansas City chapter of the Information Systems Audit and Control Association (ISACA), and…

Person holding tablet with image of VPN button on screen

SOC 2 Trust Services Criteria: What They Are and How to Select the Right Ones

| Data Privacy, Risk Management, Security, SOC Reporting | No Comments

One of the first steps you’ll take when preparing for a SOC 2 audit is selecting which trust services criteria (TSC) may be included in the report. Every SOC 2…

Contact Us for a Free Consultation

We’re here to help you! Speak with a BARR specialist about your security and compliance needs.