IT Policies

IT policies which govern acceptable use practices within the organization.

Systems & Securities Policy

Currently under review

Telephone & Email

System Security

General system security practices at George & Bell include the following:

Transferring / Receiving Data Between G&B & External Entities

George & Bell uses LiquidFiles to send and receive files that include confidential data[1] in a convenient and secure manner. This web-based application’s primary purpose is to replace insecure methods (email, postage, etc.) of moving confidential information between George & Bell and its clients.

Features include:

Each employee receives an email from LiquidFiles asking to complete the signup process. If you did not receive this message please email IT Support.

To access the LiquidFiles service, go to and bookmark: https://transfer.georgeandbell.com. For information on how to use LiquidFiles please see LiquidFiles’ User Guide.

[1] Confidential data is secret and valuable. Common examples are:

Working from Home & Security

To ensure the security of our client data and related information, work must only be performed on George & Bell-owned computers / laptops[1]. If you are not physically in the office, access client files through a secure VPN connection (from your George & Bell computer only).

Furthermore:

[1] If you need to conduct work and you do not have access to a George & Bell computer and VPN connection, you should contact your manager or a Partner to discuss how to proceed.

Physical Security

Archiving

·         To remove and secure past email messages which may have contained sensitive and/or confidential information from Microsoft Office 365, please configure and enable the AutoArchive feature within Microsoft Outlook.

·         Once enabled, all email messages older than 6 months will be removed from your Microsoft Office 365 account and stored locally within a PST file on your laptop. It will be accessible even if you are not connected via VPN and it will also be backed up (as it is stored within Documents which gets synchronized with the file server anytime the VPN is connected). Email messages stored within the archive will no longer be accessible via your mobile device or through a web browser; only via your Outlook client.

·         Please refer to the Configuring AutoArchive guide to walk you through the set-up process.

Phishing

To further enhance the firm’s cyber defenses, increased attention should be paid to some very common types of cyber-attacks. “Phishing” is the most common type of attack that affects organizations. The goal of these attacks is getting you to share sensitive information such as login credentials, credit card information or other sensitive information. Listed below are a few tips to help you spot such attempts.

  1. Do not click on any links or attachments from senders you do not recognize.
  2. Do not provide sensitive personal information such as usernames, passwords, or credit card information over email/text/messaging apps.
  3. Inspect URLs carefully to make sure they are legitimate.
  4. Always check the sender’s email address to confirm that no alterations have been made such as additional numbers, letters, or a different domain.
  5. Many phishing emails also contain a lot of spelling and grammar errors.
  6. Do not try to open documents that you are not expecting to receive.
  7. Rely on our message header (see below) that shows if the email is from an external sender. If the sender is purporting to be someone who works for George & Bell, their message will NOT have this header.
  8. Written instructions/directions from fellow G&B team members will generally be sent to you via email or Microsoft Teams. It is very rare that you would be given instructions (particularly instructions to purchase goods/services or grant access to our server or confidential client information) through any other applications (like FB messenger, WhatsApp, Signal, etc.) If you do receive instructions via this medium, you should confirm by speaking to the sender in person before acting on any instructions.
  9. If you are unsure about any instructions received by e-mail or Microsoft Teams from a G&B team member, call that person or ask your manager for help.
  10. Let your instincts and common-sense help protect you.

All employees will be required to complete information security training upon hire. Furthermore, all employees will be subject to ongoing phishing testing on a regular basis and the results of the same will be reported to the partners for further action as necessary.

Please do not hesitate to contact IT Support if you have any concerns regarding an email or attachment.


Password Policy

The following policy outlines the password requirements employees must follow in order to ensure their accounts remain secure and uncompromised.

Please see the section Password Generation Recommendations on how to easily generate a secure and memorable password.

There will be no regular interval at which a password change will be required. However, should you suspect that your account has been compromised, in conjunction with discussions with our IT provider, you should reset your password.

Domain Credentials

Domain credentials are used to logon to the majority of George & Bell's services including:

Password Requirements

1Password Master Password (Still to be released)

Your Master Password is used to logon to your 1Password account.

Password Requirements

Client/Other Service Provider Credentials

Client credentials include any services or account you use to access on behalf of a client. These services can include:

[list of common client services]

Password Requirements

Password Generation Recommendations

For your 1Password and domain credentials, its recommended that your passwords be either a grouping of easily memorable words or a short sentence. For example (but please don't use):

All of the above are easily memorized but incredibly difficult to guess.

To generate a new memorable password, feel free to use a password generator such as https://www.useapassphrase.com On online password generator is an easy way to create difficult to guess passwords without having to put much thought into them.

If opting to come up with your own password, please avoid names, places or numbers that are associated with you, your family or the company. For example don't include any of the following:

 

Assigned Equipment

Outlines what equipment each employee can expect when employed with George & Bell Consulting and how equipment is handled through its lifecycle.

Assigned Equipment

Equipment for Home

Every employee of George & Bell, upon employment is provided with a predefined set of equipment for use when working from home. Below outlines what equipment each employee's is entitled.

Fully Remote Employees

For employees who work 100% remotely and rarely come into one of George & Bell's offices.

Hybrid Employees

For employees who work both from home and out of an office on a defined schedule, two options are available. Employees may only select one option.

or

Assigned Equipment

Office-Based Equipment

Each desk at George & Bell is provided with a predefined set of equipment for use when working in the office. Below outlines what equipment each desk will be outfitted with.

It is asked that employees do not remove or move equipment between desks as all desk equipment is tracked. If you find that a piece of equipment is damaged, please contact IT Support and let them know.

Assigned Equipment

Hardware Replacement

IT-based equipment at George & Bell Consulting is replaced per the schedule below or when deemed necessary by the IT department. Early replacement is allowed if the hardware is defective or damaged and approval has been given both by the partners and the IT department. Valid reasons for early replacement include:

Hardware Replacement Cycle
Laptop 5 Years
Monitor 10 Years
Docking Station As needed
Keyboard/Mouse As needed
Power Bar As needed

Requesting Hardware Replacement

If you have equipment that requires replacement, please reach out to IT Support outlining what equipment needs replacement and what issues you're experiencing with this equipment. Replacement are provided upon approval from the IT department and the partners.

Restrictions

Restrictions

Device Restrictions

Removeable Storage Media

To eliminate the possibility of having a laptop compromised via removable storage media such as a USB flash drive or an external hard drive, the following removable storage media is blocked if connected to a company laptop:

Restrictions

Application Restrictions

Currently employees have full administrative access to their laptop, allowing for any application to be installed without approval. Due to the risk of infection leading to data breach or account compromise, its asked that employees only install applications which are relevant to their job.

The following types of applications are not permitted to be installed on laptops:

If you are unsure if an application you require is permitted or not, please contact IT Support for confirmation before installing.

Restrictions

Email Restrictions

Attachments

Any email message with the following attachment filetypes will be blocked upon being received by Microsoft 365. The sender will be notified via a NDR (non-deliverable report) indicating that the email was not delivered due to the email including a banned filetype.

.ace .ani .apk .app .appx .arj .bat .cab
.cmd .com .deb .dex .dll .docm .elf .exe
.hta .img .iso .jar .jnlp .kext .lha .lib
.library .lnk .lzh .macho .msc .msi .msix .msp
.mst .pif .ppa .ppam .reg .rev .scf .scr
.sct .sys .uif .vb .vbe .vbs .vxd .wsc
.wsf .wsh .xll .xz .z .ppsm .xlsm

Receiving Blocked Files

If you require a file that would be blocked by the above restriction, and that file is coming from a trusted source, please ask that the individual provide you the file via the LiquidFiles service.