Protect your organization's sites with a leak-proof security policy

Thursday, 11 November 2004, 12:07 AM EST

Every organization requires some type of a network site security policy that will protect the organization's valuable assets -- everything from systems to data. The policy guidelines presented here will help you to establish an enterprise-wide program for how internal and external users will interact with a company's computer network, how the corporate computer architecture topology will be implemented, and where computer assets will be located.

To create a good site policy for computer security, you need to do two things: determine your company's expectations of proper computer and network use, and define the procedures to prevent and respond to security incidents.

By Elizabeth M. Ferrarini at NewsForge.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //