Companies must also address the non-technological tools of cybersecurity. For example, current and former employees are the most frequently-cited culprits in cyber breaches. That’s why companies at the forefront of tackling the problems are going beyond a compliance checklist approach to an information security approach. They are developing broader data governance policies and practices to protect sensitive information. Thus, rather than key in on defending themselves from external threats, these companies are developing and implementing policies for the creation, use, storage, and deletion of information.
November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives