Security Handbook to establishing a security policy - Essential Guide

There exist many threats to hinder the normal running of organisations, including, of course, being hit by a computer virus intrusion or hack.

There exist many threats to hinder the normal running of organisations, including, of course, being hit by a computer virus intrusion or hack.

In order to mitigate the risks of being hit, you need to monitor a whole host of things including system patches, intrusion detection, analyse sensitive material leaving the organisation and intelligence on firewall activity.

There are absolutely vital business reasons for doing so; being hit by a virus or worm or some other threat has a direct business-related effect, not some esoteric technological one.

Download now

This was last published in November 2007

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close