Pub. 2 2022 Issue 2

www.bell.bank Member FDIC 34617 Partner with Bell for: Participation loans Bank stock and ownership loans Holding company loans and lines of credit Reg. O loans to bank employees, insiders or directors Equipment financing Find the terms and flexibility you need on large or small loans at Bell, with faster turnaround from an experienced team dedicated to correspondent lending. Whatever Loan Amount You’re Looking For, We Can Help. Bill Lloyd Call me at 573.268.5172 – Based in Columbia, MO Serving Missouri and Kansas 34617 AD Missouri Independent Bankers Assn. 2022_Bill Lloyd.indd 1 3/11/22 11:51 AM To learn more about JMARK’s awardwinning cybersecurity services and solutions, email us at JMARKIT@JMARK.com. 5. Incident Reporting Policy You might find it odd the incident reporting policy is on this list, but with a distributed workforce, it is likely that instances may happen offsite that could affect other company resources. Employees need to know the controls and procedures for reporting a problem and feel comfortable doing so even if they are the ones that initiated a security breach (for example, by clicking a link in an email that they should not have). 6. Data Storage and Backup Policy Data storage and backup policies should state how data is stored and backed up, which is very important for remote employees. Are they allowed to put files on their Windows desktop, or does the company have automation that only backs up the Documents folder? Or perhaps the data must be put on a company storage server through a remote desktop connection or mapped drive. Whatever the policies, make sure they are clear, so data is not lost if someone’s home is burglarized or another unfortunate event occurs to a device holding company data. 7. Acceptable Use Policy An acceptable use policy is a broad policy that can contain much of the information we have listed so far, but generally, the acceptable use policy describes what users may and may not do when accessing the company network. This policy should include email use, internet use, social media use, and any actions an employee needs to take to ensure they do not do something illegal that could harm the company. Summary While this is not an exhaustive list, it is a good start to ensure that your participation in the new era of a distributed workforce is performed efficiently and securely. Please keep in mind that remote employees are valuable employees, and provided they have the right tools and security infrastructure, they can perform their work every bit as securely as in-office team members. Likewise, an on-premises employee at a company office can just as easily cause an incident that releases the “tension” holding your security together. And regardless of where it begins, any breach or vulnerability scenario will have you wishing your only problem was a loose cow! ■ Continued from page 15 16 | The Show-Me Banker Magazine

RkJQdWJsaXNoZXIy ODQxMjUw