Veronica Mun

Guides (4):

Tips to Implementing Your Security Policy
July 30, 2007
When the time comes to implement a new security policy, remember to stick by your plan. Often times, the amount of man hours spent carefully planning a policy, goes down the drain during implementation when follow-through lacks order and structure.

3 Steps to Planning a Security Policy
July 24, 2007
Creating a security policy doesn’t have to be a difficult task. Breaking down all necessary components can turn an overwhelming task into one that is easily manageable and executable. This article will discuss the first step to policy success: Planning. (To learn how to implement your security policy, once it’s been planned, read Implementing Your Security Policy.)

Recycling Hardware
March 27, 2007
So you want to donate your computer to charity. Before doing so, be aware that your kind act may backfire and cause more trouble than you realize. Your computer knows you better than you think, and so will the recipients of that old PC after your thoughtful and environmentally friendly choice to recycle causes you to become a victim of identity theft.

The Business Security Quiz
March 20, 2007
Exactly how much do you really know about business security? Do you feel that you’re careful at work with electronic files? Some of your everyday tasks might be the cause of a data breach. A stray or lost laptop, word documents, spreadsheets and leaked customer information over email can cause financial and reputation problems to your company. To further your knowledge about how you and your company can play an active role in creating a security plan, take this quiz to test your security knowledge.

Advertisement

Partners

Related Resources

Other Resources