Items Tagged with "Policies and Procedures"


9259e8d30306ac2ef4c5dd1936e67634

Seven Steps for Implementing Policies and Procedures

March 17, 2011 Added by:Dejan Kosutic

Have you ever been given the task to write a security policy or a procedure, but you don't want your document to end up gathering dust in some forgotten drawer? Here are some thoughts that might help you...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security and the Path of Least Resistance

March 08, 2011 Added by:Rafal Los

When confronted with a complex, convoluted, and difficult set of security controls, users find ways around them. Once these ways are discovered, they proliferate in the organization as people figure out how to get their work done while avoiding the ugly hoops security makes them jump through...

Comments  (2)

47d6748b0a28ace8263ed75fec1afe4c

Information Security Policies and Procedures Part 1

March 04, 2011 Added by:Alex Hamerstone

It is important to note that certain policies may be confidential according to an asset classification program. A Network Security Policy delineating requirements for protections such as connection restrictions or intrusion protection and detection may be valuable for an attacker...

Comments  (0)

Page « < 9 - 10 - 11 - 12 - 13 > »