With the ever changing technological environment, what is state-of-the-art today will be obsolete tomorrow. Thus security must keep pace with these changes. Protecting a WLAN's infrastructure with MAC filtering, 802.1x security protocols, and other software security measures is just one facet of security. An information security policy is necessary to ensure that:
- Data and other confidential information the WLAN contains is protected from theft or misuse;
- Users are trained in acceptable use of computing equipment and software;
- Procedures are in place for detecting, containing, and responding to intrusions;
- Procedures are in place for measuring user compliance; and
- The policy's effectiveness is measured and reported to management.
Additionally, an information security policy must also address the requirements of any number of local, state and federal legislation dealing with security information. Here are two examples, their requirements, and the cost of non-compliance:
- The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires medical and medical insurance businesses to protect the privacy of personal health information. They must implement policies and procedures to safeguard it in any format, paper or electronic. Fines for ignoring a specific requirement under HIPAA can reach $25,000 per violation.
- The Gramm-Leach-Bliley Act (GLBA) requires financial institutions to protect consumers’ personal financial information. They must implement a comprehensive, written information security program with administrative, technical and physical safeguards for customer information. Fines for failure to do so can reach $500,000.
Security is a complex mixture of technology, business processes and people. An information security policy cannot be static and universal. It must not only address current processes and technologies, it must be reviewed on a regular basis, and updated as these processes and technologies change with time. The goal is to integrate secruity into an oranization in such a way as to enhance and safeguard each facet in the least instrusive yet mot effective way possible at a given time.