- PGP creator, other top cryptographers head 2014 National Cyber Security Hall of Fame class
- Startup backs services with elasticity of AWS, Azure clouds to outlast DDoS attacks
- Rogue cell towers discovered in Washington, D.C.
- Apple beefs up security with 2-factor authentication for iCloud backups
- Twitter patches vulnerability that could have impacted advertising accounts
Information Security Policies, Standards and Procedure
As a result of the adjustments in the way business is conducted, ownership of information does not carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information security management.
Please supply your email address to access the content.
- Instructure takes on Australian educational tech market with Canvas
- Federal Goverment prepares new laws to tackle cyberbullying on social media
- Myriad IT puts charitable fund in the Cloud
- Mobile Manufacturers Forum backs Telstra’s initiatives for disabled Australians
- Telco complaints hit six-year low