Security Threat Report 2011
By preying on our curiosity, cyber criminals are able to use psychological traps to profit from unsuspecting users of technology.
Since there doesn't seem to be a shortage of stories about lost or stolen business information this week, I thought it might be useful to highlight a couple of resources that identify info security gaps and educate both managers and employees alike about how they can address these vulnerabilities and strengthen safeguards.https://o1.qnsr.com/log/p.gif?;n=203;c=204663295;s=11915;x=7936;f=201904081034270;u=j;z=TIMESTAMP;a=20410779;e=i
Information Security for End Users, uploaded by The Computer Guy, clears up any confusion about the concept by defining information security as processes and procedures designed to protect information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. This guide includes a PowerPoint presentation that gives users an overview of security from prevention to choosing a strong password.
To assist managers in understanding how to establish and implement an information security program, the National Institute of Standards and Technology created the Information Security Handbook. This handbook provides a broad overview of information security program elements with the goal of helping managers select and implement security controls that meet the requirements of the organization and demonstrate effectiveness.
Our contributors help you make the right info security moves, from ensuring that workers understand the importance of creating and managing corporate passwords to assisting managers in weighing options when it comes to comprehensive security practices.