Items Tagged with "Best Practices"
July 11, 2011 Added by:Robb Reck
The difference between security and internal audit is slight, but significant. We are both looking to address risk, but security is considered a part of the business, and audit must be an impartial third party. By working together both teams can become better at what they do...
June 10, 2011 Added by:Thomas Fox
Ongoing monitoring, auditing and assessments need to go down to the individual employee level. There should be both a ‘carrot and stick’ approach so that employees are disciplined for compliance failures, but also rewarded for doing business through appropriate compliance avenues...
May 31, 2011 Added by:Global Knowledge
I make a point to preach password security to most co-workers I supported – especially those who dealt with personnel records, credit card info, and other potentially sensitive documents. Below are some tips that will make your passwords a hundred times harder to hack...
May 04, 2011 Added by:Headlines
‘Best Practices for Keeping Your Home Network Secure’ is a new guide published by the National Security Agency. This document provides home users directions for keeping their systems secure and protected...
March 12, 2011 Added by:Thomas Fox
Many companies focus on the specifics of a best practices FCPA compliance program, we believe they should also make documentation an over-arching principal in their compliance programs. Everything done or performed within the context of your FCPA compliance program should be documented...
March 10, 2011 Added by:Headlines
The results of the poll indicate that a significant portion of those who are assumed to be more security conscious than most still retain a certain level of complacency when it comes to security best practices...
March 10, 2011 Added by:Allan Pratt, MBA
Topics to discuss include good security practices such as making regular back-ups, encrypting sensitive data, turning off computers before leaving the office, carefully disposing of storage devices, and not installing illegal copies of software on company computers or devices...
February 26, 2011 Added by:Thomas Fox
The key point is that a Risk Assessment is absolutely mandatory and must be used as a basis for the design of an effective compliance policy. If a Risk Assessment is not used, it might be well nigh impossible to argue that your compliance program meets even the basic standards...
October 30, 2010 Added by:Kevin L. Jackson
Showcasing the positive progress of Federal Government Agencies and their strategic partners in meeting the goals of their Mission Programs. This issue, Cloud Computing in Government, features the Trends and Best Practices on Cloud Computing in Government...
From the Web
December 11, 2009 from: hackyourself.net
These days, security advisors talk a lot about Best Practices: establishes procedures that are generally held to yield good results. Deploy Best Practices in your organization, the advisors say, and your security will improve. That's true, as far as it goes, but often we can make more progress by working to eliminate Worst Practices.