Seven-Step Security Awareness Action Plan - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Seven-Step Security Awareness Action Plan-5 Next

Consider using an automated system to deliver policies and associated documentation directly to employees at their workstations. This makes the whole process manageable for you both.

Unless IT security is a core element of someone's job, it is not necessarily considered one of their on-going development needs. All too often, employees get just an initial presentation from the IT department when they start and are expected to remember it, keep up to speed with changes, and adhere to ever-changing IT security policies and procedures.

Without an ongoing systematic and proactive user awareness program, a strong security posture is in jeopardy. There is no cure for stupidity or genuine human error, but you can educate your workforce to help them make the right decisions and avoid unnecessary mistakes. What are you doing to make sure your workforce is security aware?

This slideshow features a seven-step security awareness action plan, identified by Dominic Saunders, senior vice president of the NETconsent business unit at Cryptzone, to help ensure employees are onboard and up-to-speed on company security policies.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.