6 Certifications That Get You Hired as a Security Pro
In cyber security, the list of skills isn't really new or special, but when it comes down to proving abilities, a certification is required, advises ClearanceJobs.com.
In addition to posting general social-media guidelines and specific best-practices policies for Twitter, YouTube, LinkedIn and Facebook, Colorado State University recently contributed its Information Technology Security Policy to the Knowledge Network. The University policy addresses the need to protect personally identifiable information from unauthorized access, especially to remain in compliance with federal, state and private-sector mandates, such as HIPAA, FERPA and the Payment Card Industry Data Security Standard.
If you are an IT decision-maker responsible for creating similar policies for your academic institution, business or other organization, take a look at some of the other IT security policies provided by our other Knowledge Network contributors. These documents demonstrate what other organizations are doing to address IT security and serve as good starting points for developing policies that suit your environment.
More from IT Business Edge and the Knowledge Network
More from Our Network