InfoSec Policies and Standards: Some strategic context for those just diving into this world
CTOvision
MAY 22, 2014
Once the information security policy is written to cover the rules, all employees should adhere to it while sending email, accessing VOIP, browsing the Internet, and accessing confidential data in a system. Some of the assets that these policies cover are mobile, wireless, desktop, laptop and tablet computers, email, servers, Internet, etc.
Let's personalize your content