Simply formatting your hard disk to erase data before disposing of the machine is insufficient – a savvy crook can still recover it, data theft… Read More »GISF: Where can personal data be found?
GISF: Does your information security policy have the authority it needs to manage and ensure compliance with the information security policy?
You use the information for security purposes, to facilitate navigation, to display information more effectively, to personalize, tailor your experience while engaging with you, and… Read More »GISF: Does your information security policy have the authority it needs to manage and ensure compliance with the information security policy?
Establishing an ethical environment at all levels of your organization is the most important element of accountability and control. In addition, the purchase order officially… Read More »GISF: Is a payment system in place with proper reviews and approvals?
Identifying and reducing risks, and responding to any information security incident, is a top priority that pulls resources from all areas together, you may want… Read More »GISF: How many internet-facing hosts do you want the information security office to assess?
By taking a holistic, platform approach to technology risk management, security teams reduce the number of point products, reallocate budget and scarce resources and justify… Read More »GISF: How do you justify the information security budget requirements to the board?