Simply formatting your hard disk to erase data before disposing of the machine is insufficient – a savvy crook can still recover it, data theft… Read More »GISF: Where can personal data be found?
Your organization and customers include organizations of all sizes and across many sectors, with a particular focus on technology and media businesses, you can request… Read More »GISF: Is the data disclosed to other users or systems?
Establishing an ethical environment at all levels of your organization is the most important element of accountability and control. In addition, the purchase order officially… Read More »GISF: Is a payment system in place with proper reviews and approvals?
Identifying and reducing risks, and responding to any information security incident, is a top priority that pulls resources from all areas together, you may want… Read More »GISF: How many internet-facing hosts do you want the information security office to assess?
The ambition for organizations is to provide each of customers online secure login, data access control and the best user experience without compromising security, sales… Read More »GISF: Who is responsible for access control?