Dancing the "One Step"
November 03, 2011 | POSTED BY DOMINIC SCHULTE IN UNCATEGORIZED
Why internal security really matters
I have been a part of numerous conversations that have led me to believe that there is a common misperception regarding network security. This false notion is that perimeter security alone is enough to protect a net...READ MORE +
3 P's of Information Security: Policies - A Blueprint for Success
November 03, 2011 | POSTED BY KAYNA KELLEY IN UNCATEGORIZED
In the last Security Notes, we covered the second of the "3 P's," of information security: people. This month we will introduce the last "P" - policies.
Blueprints are used in the construction industry as detailed plans, containing the structural, elec...READ MORE +
3 Ps of Information Security: Perimeter, People and Policies
November 03, 2011 | POSTED BY JERALD DAWKINS IN UNCATEGORIZED
Security starts before you even turn on your computer?
Information security starts well before you even turn on your computer. Its success relies upon many elements stretching far beyond the technical controls and buzzwords like firewalls and encryptio...READ MORE +