Security: The Human Factor Security: The Human Factor

Security: The Human Factor

    • 9,99 $
    • 9,99 $

От издателя

Address human vulnerabilities with this essential guide … Practical advice from an acknowledged expert – endorsed by BT!

Your business information is likely to be much more valuable than the hardware on which it is stored. The loss of a laptop might set you back £400, but if the files on the laptop included sensitive customer data or the blueprint for a new product, the cost of repairing the damage would run into thousands. The consequences of a data breach range from alienating customers to heavy fines, or even criminal prosecution. While technologies, such as antivirus software and encryption, can offer some protection against cybercrime, security breaches are most often the result of human error and carelessness.
 


Improve information security
Improving information security within your organisation, therefore, has to encompass people and processes, as well as technology. Motivating your team and making them more aware of security concerns should be at the heart of your information security strategy. At the same time, the processes you have in place to address information security issues need to be straightforward and properly understood if you want your employees to adhere to them.
 


BT’s approach
This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

ЖАНР
Компьютеры и Интернет
РЕЛИЗ
2010
6 декабря
ЯЗЫК
EN
английский
ОБЪЕМ
72
стр.
ИЗДАТЕЛЬ
IT Governance Publishing
ПРОДАВЕЦ
IT Governance
РАЗМЕР
177,5
Кб
Information Security for Decision Makers: The Corporate Guide to Infermation Security Spending Information Security for Decision Makers: The Corporate Guide to Infermation Security Spending
2011
Information Security Management Handbook, Volume 6 Information Security Management Handbook, Volume 6
2016
Computer Security: 20 Things Every Employee Should Know Computer Security: 20 Things Every Employee Should Know
2006
The Coming Cyber War: What Executives, the Board, and You Should Know The Coming Cyber War: What Executives, the Board, and You Should Know
2020
Cyber Attacks Cyber Attacks
2012
Network Attacks and Exploitation Network Attacks and Exploitation
2015
The Wolf in the Attic The Wolf in the Attic
2016
Corvus Corvus
2011
Calgar's Siege Calgar's Siege
2016
Hawkwood and the Kings Hawkwood and the Kings
2010
Kings of Morning Kings of Morning
2012
The Mark of Ran The Mark of Ran
2005