Security

Security

Security

Paul Kearney / Paul Paul Kearney

17,72 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing Ltd
Año de edición:
2010
Materia
Gestión: liderazgo y motivación
ISBN:
9781849280631
17,72 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Your business information is likely to be much more valuable than the hardware on which it is stored. The loss of a laptop might set you back £400, but if the files on the laptop included sensitive customer data or the blueprint for a new product, the cost of repairing the damage would run into thousands. The consequences of a data breach range from alienating customers to heavy fines, or even criminal prosecution. While technologies, such as antivirus software and encryption, can offer some protection against cybercrime, security breaches are most often the result of human error and carelessness.Improve information security Improving information security within your organisation, therefore, has to encompass people and processes, as well as technology. Motivating your team and making them more aware of security concerns should be at the heart of your information security strategy. At the same time, the processes you have in place to address information security issues need to be straightforward and properly understood if you want your employees to adhere to them.BT’s approach This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.Read this guide and ... •Win business By demonstrating that there are effective safeguards for your business information in place, you can strengthen the trust of partners and customers and improve the image of your brand. Effective information security may even provide the extra advantage you need to close an important deal. •Protect your organisation from social engineering attacksOnce fraudsters have gained the trust of a company employee they will then seek to exploit that trust for their own criminal purposes by persuading the employee to divulge confidential information. This pocket guide will help your staff to be on their guard against this type of threat. •Improve processes and proceduresThe guide sets out some basic precautions that employees can take, both in and outside the workplace, to reduce the risk of a data breach. •Enable people to make a positive contribution to securityThe processes you have in place to manage your information security need to be observed. At the same time, you are unlikely to achieve the optimum level of protection unless your workforce understands the reason why these policies are necessary. This pocket guide shows you how you can enhance your information security by engaging and motivating your staff. Security: The Human Factor looks at the challenges associated with information security, the consequences of failing to meet them and - most importantly - at the steps organisations can take to make themselves and their information more secure.

Artículos relacionados

  • Mean Men
    Mark Lipton
    Winner of the 2018 Axiom Award for Business CommentaryThe troubling psychology behind some of America’s most famous menSteve Jobs, Dov Charney, Lance Armstrong, Donald Trump. Each one has reached the pinnacle of American success. Is it because they were ambitious visionaries and talented entrepreneurs? Most Americans would say yes to both. But what else do they have in common?T...
    Disponible

    12,12 €

  • Mitchell Levy on Creating Thought Leaders (2nd Edition)
    Mitchell Levy
    In today’s world where an organization’s prospect has access to more information about the industry, key firms within that industry, and customer testimonials of those using products and services from companies in the industry, how can any organization stand out? In some industries, buyers have conducted 75 percent of their research on the Internet prior to talking to any firms...
    Disponible

    23,48 €

  • Responsible Management of Information Systems
    Bernd Carsten Stahl
    ...
  • Outsourcing and Offshoring of Professional Services
    Amar Gupta
    A growing number of companies are opting to perform increasing types of professional services in foreign countries, creating, for some companies, unprecedented opportunities to reduce costs and nucleate strategic relationships, while, for others, representing a major threat to current prosperity. Outsourcing and Offshoring of Professional Services: Business Optimization in a Gl...
  • Computer-Mediated Relationships and Trust
    Linda L. Brennan / Linda LBrennan / Victoria E. Johnson / Victoria EJohnson
    ...
  • Cases on Online Discussion and Interaction
    Discussion, whether in online or face-to-face environments, is central to attaining and disseminating information. Cases on Online Discussion and Interaction: Experiences and Outcomes contains examples of online discussions in a variety of contexts and for a variety of purposes, allowing readers to understand what is likely to facilitate discussion online, what is likely to enc...