News

Purdue University information security policies, standards, guidelines, and procedures institute controls that are used to protect Purdue University data and IT Resources. While every exception to a ...
Any mature security program requires each of these infosec policies, documents and procedures.
Such data breaches, especially in the public sector, can have serious consequences, from identity theft to endangering the lives and physical security of the individuals whose data is compromised.
Companies are not following simple data security procedures in seven high-risk scenarios, according to new research announced today by the Ponemon Institute, a privacy and information management ...
While it's important to implement processes and procedures that safeguard data security and privacy, you can also focus on more strategic data governance goals.
Here, we break down what data privacy and data security actually stand for, their main differences and similarities, as well as how tech like VPNs can help to boost the protection of both. You may ...
Understand and report security risks and how they impact the confidentiality, integrity and availability of information assets Data Custodians need to have a thorough understanding of security risks ...
The purpose of this standard is to provide instructions on proper sanitization of data in both electronic and paper form. This standard also provides instruction on secure disposal of electronic ...
Companies deploying cloud computing solutions don't have the procedures in place to ensure data and information are protected and that vendor products adhere to security policies.
My recommendation, based on a number of conversations with mainly front-line IT specialists, along with reading a large number of security-oriented product pitches and books, is to focus on procedure.