Security policies: only as good as the audit

Thursday, 22 August 2002, 1:08 AM EST

Consider these questions:

- Does your security policy sufficiently address governmental regulations that might apply to your specific industry?
- Are you meeting global IT security standards, such as ISO17799?
- Has the CEO and the governing board signed off on your security policies?

One way to answer all these crucial questions and gauge true security preparedness is to undertake an IT security policy audit.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //