Industrial espionage was once a thorn in the side of companies on both sides of the Atlantic, often due to strict competition laws or interest from communist countries. Things have moved on since the 1970s and 80s, however – things have moved online, and it’s getting dangerous…
Advice about how to create and implement security policies and what security policies your business needs
Security policies are an essential component of any security strategy. This topic contains articles which explain why you need security policies, how to create and implement security policies and how to get your employees to read security policies.
An Information Security Officer is a new job title with a variety of duties that were previously handled by risk management, compliance, the legal department, and the IT department of an organization. We took a look at several job postings and came up a with a list of an ISO’ duties.
Few targets are as tempting to a thief as an unattended laptop. The easy-to-steal device is often extremely expensive and usually houses even more valuable information. Fortunately there are a few security recommendations for laptop theft prevention we can follow to deter would-be thieves
Kids love to break rules sometimes. This article covers some ways that kids try to get around Internet filters, and what can be done to prevent it.