article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Security policies need to be properly documented, as a good understandable security policy is very easy to implement. Version – A version number to control the changes made to the document. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. Implement policies.

Policies 268
article thumbnail

The Problem That CIOs Have With Windows Software

The Accidental Successful CIO

There is a fundamental weakness in the architecture of the Windows platform, which seems to make it particularly vulnerable to malware. It is also provides the set of tools that lets users take data from an Excel spreadsheet and insert it into a Word document. They are critical to the functioning of the connected world.

Windows 100
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

VAMOSI: Once the classified documents were found online, there was an effort -- both by law enforcement and by the media -- to identify the leaker. It turns out some of the classified documents were photographed on a marble countertop, like in a kitchen countertop. Let's analyze malware. They could. And there were. Not the same.