|
![]() |
|||
|
||||
OverviewAddress human vulnerabilities with this essential guide - Practical advice from an acknowledged expert - endorsed by BT! Your business information is likely to be much more valuable than the hardware on which it is stored. The loss of a laptop might set you back GBP400, but if the files on the laptop included sensitive customer data or the blueprint for a new product, the cost of repairing the damage would run into thousands. The consequences of a data breach range from alienating customers to heavy fines, or even criminal prosecution. While technologies, such as antivirus software and encryption, can offer some protection against cybercrime, security breaches are most often the result of human error and carelessness. Improve information security Improving information security within your organisation, therefore, has to encompass people and processes, as well as technology. Motivating your team and making them more aware of security concerns should be at the heart of your information security strategy. At the same time, the processes you have in place to address information security issues need to be straightforward and properly understood if you want your employees to adhere to them. BT's approach This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives. Full Product DetailsAuthor: Paul Kearney , IT Governance PublishingPublisher: IT Governance Publishing Imprint: IT Governance Publishing Dimensions: Width: 9.40cm , Height: 0.40cm , Length: 16.30cm Weight: 0.068kg ISBN: 9781849280631ISBN 10: 1849280630 Pages: 72 Publication Date: 23 December 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Unknown Availability: Awaiting stock ![]() Table of ContentsIntroduction Chapter 1: Carelessness Chapter 2: Accidental Disclosure Chapter 3: People are Intelligent Chapter 4: An Aside: Password Policies Chapter 5: People are Helpful and Trusting Chapter 6: Harnessing Human Qualities to Improve Security Chapter 7: Why Raise Awareness? BT case study Chapter 8: Beyond Awareness Chapter 9: The Extended Enterprise Chapter 10: Process Design Chapter 11: Usability Chapter 12: And Finally ITG ResourcesReviewsAuthor InformationPaul Kearney is chief security researcher in the Security Futures Practice, BT Innovate & Design. He is based at BT's Adastral Park technology centre near Ipswich, and has worked in information security research since 2001. Paul Kearney is a Certified Information System Security Professional (CISSP) and a full Member of the Institute Of Information Security Professionals (MInstISP). He holds a PhD in theoretical physics from the University of Liverpool, and is the co-author of the White Paper, Human Vulnerabilities in Security SystemsA"", published in 2007 by the Cyber Security Knowledge Transfer Network. Tab Content 6Author Website:Countries AvailableAll regions |