<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Policies on Riskitera Blog</title><link>https://blog.riskitera.com/en/tags/policies/</link><description>Recent content in Policies on Riskitera Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 30 Apr 2026 11:50:10 +0200</lastBuildDate><atom:link href="https://blog.riskitera.com/en/tags/policies/index.xml" rel="self" type="application/rss+xml"/><item><title>Information Security Policies: How to Create Them from Scratch</title><link>https://blog.riskitera.com/en/posts/2026/03/information-security-policies-guide/</link><pubDate>Fri, 20 Mar 2026 00:00:00 +0000</pubDate><guid>https://blog.riskitera.com/en/posts/2026/03/information-security-policies-guide/</guid><description>&lt;p>Information security policies are the foundational documents that establish the rules, principles, and guidelines governing information protection within an organization. Without clear, approved, and communicated policies, security depends on inconsistent individual decisions, which leads to breaches, regulatory non-compliance, and a fragile security posture. According to the &lt;a href="https://www.ccn-cert.cni.es/">CCN-CERT&lt;/a>, a significant percentage of security incidents in Spanish public bodies originate from the absence or ignorance of basic policies. This guide explains what security policies are, what types your organization needs, and how to draft, approve, communicate, and maintain them.&lt;/p></description></item></channel></rss>