We all know how important they are, but the fact is that security policies are often the most neglected part of information security programs. IT compliance starts with comprehensive security policies that are issued by an organization to secure its valuable information. Though a time investment, policies can be addressed with little or no cost. …
The Risk of Cyber Security BreachesI attended a security conference recently and it was interesting to hear about the various cyber security breaches that companies suffered and how failures in their information security programs lead to those breaches. Following the usual round of Monday morning quarterback type of discussions, I could not help but wonder …