Poor network policies tend not to have: levels of access to prevent users from accessing sensitive data unless they are authorised to do so, rules preventing the connection of external devices such as USB memory sticks which may contain and transmit viruses, regulation regarding secure passwords, rules to govern what websites can and cannot be visited, methods to prevent any user wirelessly connecting an unsecured laptop, tablet or smartphone, controls on what facilities can be accessed remotely, a formal backup procedure that is adhered to, a regular maintenance programme that is followed