Start by better understanding drivers of change and taking these four steps to consider risk.
Bestselling author Michael Levin interviews David X Martin on how large enterprises can protect themselves from cyber attacks and develop cyber wellness.
Human error is often the weak link in security due to a lack of awareness on an employee’s part about the consequences of improper actions, and how that ultimately impacts the system as a whole.
A security risk assessment can be performed on any application, function, or process within your organization. The results give you a practical (and cost-effective) plan to protect assets and still maintain a balance of productivity and operational effectiveness.
An Information Technology (IT) Security Policy identifies the rules and procedures for all individuals accessing and using an organization’s IT assets and resources.
It’s up to management to make sure IT’s got a seat at the table, Martin says in this interview on the Business Security Weekly podcast.