Seven-Step Security Awareness Action Plan

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Previous Seven-Step Security Awareness Action Plan-1 Next

Click through for a seven-step plan to help ensure employees are following company IT security policies, as identified by Dominic Saunders, senior vice president of the NETconsent business unit at Cryptzone.

Unless IT security is a core element of someone's job, it is not necessarily considered one of their on-going development needs. All too often, employees get just an initial presentation from the IT department when they start and are expected to remember it, keep up to speed with changes, and adhere to ever-changing IT security policies and procedures.

Without an ongoing systematic and proactive user awareness program, a strong security posture is in jeopardy. There is no cure for stupidity or genuine human error, but you can educate your workforce to help them make the right decisions and avoid unnecessary mistakes. What are you doing to make sure your workforce is security aware?

This slideshow features a seven-step security awareness action plan, identified by Dominic Saunders, senior vice president of the NETconsent business unit at Cryptzone, to help ensure employees are onboard and up-to-speed on company security policies.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.