This cyber security checklist helps IT teams assess and record the status of key security controls across people, physical facilities, accounts and passwords, and sensitive data protection. It covers laptop and workstation security, access control, visitor management, screen locking, encryption, data retention, disposal of media, and PCI and privacy practices. It also guides disaster recovery and business continuity planning, incident communication, and regular training and awareness. Use it to audit compliance with policies and standards, identify gaps, and strengthen your organization’s security posture.
With SafetyCulture you can
With SafetyCulture you can
About author
This community page makes available free workplace checklists and templates created by other users within the SafetyCulture community. SafetyCulture has re-published this content and where possible, has credited the original author. SafetyCulture has not verified the accuracy, reliability or suitability of any community content. You agree that your use of any of this content is in accordance with SafetyCulture’s Terms and Conditions.
