Items Tagged with "Best Practices"


59d9b46aa00c70238bb89056cfeb96c0

Essentials for an FCPA Compliance Program

June 10, 2011 Added by:Thomas Fox

Ongoing monitoring, auditing and assessments need to go down to the individual employee level. There should be both a ‘carrot and stick’ approach so that employees are disciplined for compliance failures, but also rewarded for doing business through appropriate compliance avenues...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Ten Steps To A More Secure Password

May 31, 2011 Added by:Global Knowledge

I make a point to preach password security to most co-workers I supported – especially those who dealt with personnel records, credit card info, and other potentially sensitive documents. Below are some tips that will make your passwords a hundred times harder to hack...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

NSA Issues Guide for Keeping Home Networks Secure

May 04, 2011 Added by:Headlines

‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Documentation and the TRACE Due Diligence Guidebook

March 12, 2011 Added by:Thomas Fox

Many companies focus on the specifics of a best practices FCPA compliance program, we believe they should also make documentation an over-arching principal in their compliance programs. Everything done or performed within the context of your FCPA compliance program should be documented...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Infosec Pro's Need to Practice What They Preach

March 10, 2011 Added by:Headlines

The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Does Your Company Have a Security Awareness Training Program?

March 10, 2011 Added by:Allan Pratt, MBA

Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...

Comments  (6)

59d9b46aa00c70238bb89056cfeb96c0

FCPA Risk Assessments and Current Best Practices

February 26, 2011 Added by:Thomas Fox

The key point is that a Risk Assessment is absolutely mandatory and must be used as a basis for the design of an effective compliance policy. If a Risk Assessment is not used, it might be well nigh impossible to argue that your compliance program meets even the basic standards...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

On The Frontlines: Cloud Computing in Government

October 30, 2010 Added by:Kevin L. Jackson

Showcasing the positive progress of Federal Government Agencies and their strategic partners in meeting the goals of their Mission Programs. This issue, Cloud Computing in Government, features the Trends and Best Practices on Cloud Computing in Government...

Comments  (0)


From the Web

The Role of Worst Practices in Insecurity

December 11, 2009 from: hackyourself.net

These days, security advisors talk a lot about Best Practices: establishes procedures that are generally held to yield good results. Deploy Best Practices in your organization, the advisors say, and your security will improve. That's true, as far as it goes, but often we can make more progress by working to eliminate Worst Practices.

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »