8 Elements of Complete Vulnerability Management
Eight essential elements to help reduce your vulnerability to hackers.
The federal government's efforts to implement cyber security policies may be hampered by political wrangling and bureaucratic red tape, but that doesn't mean that you can take a leisurely pace when it comes to protecting your organization's IT assets and sensitive information. Hackers, phishers, cyber terrorists and other criminal coders certainly aren't breaking stride.
To offer an example of how one government agency handles this, the City and County of San Francisco Committee on Information Technology (COIT) created a security policy to inform users, staff and managers of their responsibilities, obligations and requirements to protect information technology and assets. Rather than delving immediately into the nuts and bolts of techniques, this policy lays the foundation upon which specifics can be developed by requiring:
These Knowledge Network resources can provide additional help:
Network Security Policy for Portable Computers
Colorado State University Information Technology Security Policy
Post a comment