Inicio > > Seguridad informática > IT Induction and Information Security Awareness
IT Induction and Information Security Awareness

IT Induction and Information Security Awareness

IT Induction and Information Security Awareness

Valerie Maddock

17,69 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing Ltd
Año de edición:
2010
Materia
Seguridad informática
ISBN:
9781849280334
17,69 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Where your information security is concerned, prevention is better than cure.If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention.Training Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company’s information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. Practical advice This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company’s information security and reduce the risk that your data will be stolen or lost. A sense of responsibility Encouraging good corporate working and a strong sense of responsibility are, the author argues, essential for the protection of your business information. She shows you how to strike the right balance in your approach to staff training, thereby enabling you to provide your employees with an IT Induction that is at once informative and accessible. Benefits to business include:•Reduce the likelihood of a damaging security breach. Putting in place a programme of IT Induction will help ensure that your company’s staff are following information security best practice. Educating employees in good IT working practices will help them to avoid the errors that might otherwise put your organisation at risk.•Protect the company’s reputation. The damage an information security breach can do to your business goes beyond the initial cost of clearing up the mess. Without proper staff training, the danger is that theft or loss of data will damage your company’s reputation. You need to provide your staff with a proper IT Induction in order to preserve good relations with your customers.•Avoid legal complications. IT offers business new, less formal means of communication. Employees write e-mails in a different style from the way they write letters. However, contracts can be made or broken via e-mail, and e-mail correspondence can be cited in litigation. An IT Induction programme will give your staff the appropriate guidance on e-mail communication with the clients or business partners of your company.•Manage employee working practices. Laptop computers and broadband mean that for many employees, the boundaries between work and home are becoming blurred. If you allow your staff to mix and match between working in the office and working from home, you need to make sure they know what they have to do to safeguard your firm’s data both inside and outside the office. As the author comments, ''Empowering and trusting employees, through good educational practices and advice specific to their needs, is the best solution to address information security risk''. ’This clearly written booklet is soundly based in practice, and I challenge anyone with responsibilities in IT or HR in an organisation not to find value in it.’ David Clayden About the author Valerie Maddock holds a degree in Computer Science from the Open University and has over 35 years’ experience in IT. Since 1996 she has been employed in the IT department of the Salvation Army UK. She created the department’s IT Learning and User Support Unit, and also developed an online IT Induction programme for the needs of the Salvation Army’s staff.

Artículos relacionados

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
  • Effective Cybersecurity Operations for Enterprise-Wide Systems
    Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on...
    Disponible

    248,86 €

  • IT for Business
    John Young
    IT for Business: A Student’s Guide to the Technology of Business provides readers with a comprehensive understanding of the role and application of information technology in the business world. Each chapter in the book focuses on a different aspect of IT as it relates to business. The opening chapter sets the stage by discussing the importance of developing a keen understanding...
    Disponible

    140,50 €

  • Evolution of Cross-Sector Cyber Intelligent Markets
    Eugene J. Lewis
    In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of the...
    Disponible

    275,51 €