10-Step Security and Vulnerability Assessment Plan
Use this plan to ensure your information system controls are correctly implemented.
As an IT manager, you want to try to accommodate users' needs when it comes to allowing them to install work-related software on their computers and other devices. But, as Knowledge Network contributor Info-Tech Research Group points out in its Software Installation Policy, "certain types of software can open significant security holes in the enterprise network."
On top of security issues, legal issues surround using unlicensed or pirated software, and quality issues can arise when employees use unsupported programs. Put a software policy in place to make sure workers only use software that is licensed, supported and sanctioned by your IT department.
More Security Policies from the Knowledge Network