Seven-Step Security Awareness Action Plan - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Seven-Step Security Awareness Action Plan-8

If people see policies being enforced consistently at all levels within an organization, and where appropriate disciplinary action is taken against those who willfully neglect corporate rules, they are more likely to take notice of security information. When employees realize the circumstances and the consequences of security policy violations for them as well as for the organization, it nudges them to choose the right course of action, and perhaps be more prepared to encourage others to conform to standards of behavior within the acceptable governance framework.


Unless IT security is a core element of someone's job, it is not necessarily considered one of their on-going development needs. All too often, employees get just an initial presentation from the IT department when they start and are expected to remember it, keep up to speed with changes, and adhere to ever-changing IT security policies and procedures.

Without an ongoing systematic and proactive user awareness program, a strong security posture is in jeopardy. There is no cure for stupidity or genuine human error, but you can educate your workforce to help them make the right decisions and avoid unnecessary mistakes. What are you doing to make sure your workforce is security aware?

This slideshow features a seven-step security awareness action plan, identified by Dominic Saunders, senior vice president of the NETconsent business unit at Cryptzone, to help ensure employees are onboard and up-to-speed on company security policies.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.