To mitigate risks and vulnerabilities, individuals are responsible for ensuring that the computers and devices used to access Nested Knowledge services and systems are protected by basic security measures.
This policy affects all employees, contractors, and consultants of Nested Knowledge.
End-user device: Any desktop or laptop computer, any tablet, smart phone, or other mobile device is an end-user device. “End-user device” does not include removable storage like USB flash drives.
End-user: A member of the Nested Knowledge workforce who accesses to information technology resources.
We require end-user devices to be protected by the security procedures described:
Nested Knowledge reviews the applications installed on employee devices on a quarterly basis using our Mobile Device Management solution.
Nested Knowledge uses Mosyle to prompt employees to download and install the latest software updates for the operating system (MacOS) and applications. For both OS and most application updates, if updates are not installed by the employee within five (5) days of release, the updates are installed automatically. Nested Knowledge developers with root-access to their devices may choose to delay software updates, but they are required to update software within 3 months of the software release and notice.
We require Nested Knowledge employees to run antivirus software on the company-issued computers. Software includes macOS built-in anti-malware technologies and Mosyle's Detection & Removal technology. We require contractors to use Malwarebytes to scan and detect malware and ransomware. Positive findings must be reported to the CTO. Antivirus software installs must be updated (either by updating ruleset or fresh reinstalling) whenever scans are performed.
The schedule for scanning is subject to change, but it will not fall below the minimum of twice annually. Currently, Nested Knowledge employee devices use macOS malware defense as well as Mosyle's anti-virus tools. macOS's built in technology XProtect updates signatures automatically when new malware infections and strains are detected.
Positive results in the scan must be reported to one or more members of the Incident Response team. If a virus is detected, all members of the IR team must be notified immediately.
Failure to comply with this policy may result in disciplinary actions.
Author | Date of Revision/Review | Comments |
---|---|---|
K. Cowie | 01/25/2024 | Added application review |
K. Holub | 12/15/2021 | Policy approved |
K. Kallmes | 12/18/2021 | Policy approved |
P. Olaniran | 10/25/2022 | Minor revisions |