- Integrate encryption with device management to overcome key-management issues: LANDESK
- Plex hacker demands Bitcoin ransom for return of data
- Telcos, government agencies least trusted to protect Australians' privacy
- Australia is world's fourth-largest holder of network-security patents, analysis finds
- How a burglar can make a copy of your door key, from a Facebook picture
Information Security Policies, Standards and Procedure
As a result of the adjustments in the way business is conducted, ownership of information does not carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information security management.
Please supply your email address to access the content.
- UXC Oxygen appoints Craig Stevenson as business manager
- Ransomware in Australia has seen a steady growth in the past six months: Bitdefender
- Canon opens the doors on new headquarters in Brisbane (+14 photos)
- Gartner explains how businesses can simplify the mid-market datacentre
- Cisco launches Internet of Everything Innovation Centre in WA