Logmaster Australiaimplements controls to protect against malicious and mobile code. The potential for the introduction of malicious software into any IT system must be minimised. All systems are monitored for potential malicious software activity using anti-virus (AV) software and supporting AV policies. This allows malicious software to be identified, isolated, and removed using AV application controls
All Logmaster Australia people must identify the classification of information at creation and record that classification with the information, or the system processing, transmitting or storing that information.
Common information security attacks target out of date software or that for which there is a known vulnerability, exploiting most organisations inability to quickly patch the flaws in their IT systems.
All information security incidents are treated as priority incidents. The impact of an information security incident on Logmaster Australia may be critical and it is important that for all actual or suspected information security incidents:
Information and Incidents Policy
Risk management policy and escalation table
Original Policy Development
Policy Approved by Executive Director