To identify examples of data that your business feels confidential and how information is handled. This information is often the type of files that are backed up regularly and targeted for many cyber crime activities. E-mail can be a convenient way to communicate information, even though the written record of communication is also a source of responsibility, the blue team training it is filed incorrectly.
E-mail policy has a constant direction for sending and receiving e-mails and integration to all, which is used to reach the company’s network. It includes mobile devices in your own device (BYOD), as well as network access used to connect the network data remotely.