CATEGORY: Cybersecurity and
16.0 – Cyberspace & Cybercrimes
Security of data is in everyone’s best interest. It can only be accomplished with mutual power. Cyber threats are global issues, and so handling...
15.3 – Review and Modify
Executive management and Directors have a fiduciary responsibility to manage the organization in a responsible way. It is essential that they are able to...
15.2 – Train and Enforce Policy
The basis for any organization’s information security is security policy. Many organizations have information security policies in place to assure that their information is...
15.1 – Review & Write Policy
There are usually many reasons to update policies over time. Such include new technology deployment, decommissioning of old software or hardware, updated regulatory systems...
15.0 – Identify Needs, Issues and Threats
There are important components which are necessary to have an efficient security policy implementation. There could be an investigation into an existing security policy...