3 P's of Information Security: Policies - A Blueprint for Success
November 03, 2011 | POSTED BY KAYNA KELLEY IN UNCATEGORIZED
In the last Security Notes, we covered the second of the "3 P's," of information security: people. This month we will introduce the last "P" - policies.
Blueprints are used in the construction industry as detailed plans, containing the structural, elec...READ MORE +
3 Ps of Information Security: Perimeter, People and Policies
November 03, 2011 | POSTED BY JERALD DAWKINS IN UNCATEGORIZED
Security starts before you even turn on your computer?
Information security starts well before you even turn on your computer. Its success relies upon many elements stretching far beyond the technical controls and buzzwords like firewalls and encryptio...READ MORE +
Cancel or Allow?
November 03, 2011 | POSTED BY DOMINIC SCHULTE IN UNCATEGORIZED
I have been enjoying a commercial that has been running for a few weeks that plays on the security aspects of two different computers:
Mac: "Hello, I'm a Mac."
PC Security Agent: "Mac has issued a salutation, cancel or allow?"
PC: "Allow, and I'm a PC....READ MORE +