It has been my experience that many groups do a poor job of managing the information security tools they have. This comment is not directed at managing costs or keeping up with renewals, though that can be a problem as well. Instead it is about how we deploy and employ the tools themselves.So how are …
We all know how important they are, but the fact is that security policies are often the most neglected part of information security programs. IT compliance starts with comprehensive security policies that are issued by an organization to secure its valuable information. Though a time investment, policies can be addressed with little or no cost. …
The Risk of Cyber Security BreachesI attended a security conference recently and it was interesting to hear about the various cyber security breaches that companies suffered and how failures in their information security programs lead to those breaches. Following the usual round of Monday morning quarterback type of discussions, I could not help but wonder …