Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Ways to get employees to buy-into security policies
- This topic has 4 replies, 1 voice, and was last updated 1 year, 11 months ago by .
-
Topic
-
Forbes posted this article discussing how security leaders from different companies get their employees to follow the policies that are in place to secure information. This article recognizes humans are mainly responsible for security breaches and many companies face an ongoing fight to keep their employees headed in the right direction when it comes to securing the companies assets. Some items to keep in mind that i pulled from the article is to make sure policies and procedures are easy to follows and leave no guessing for the employee and tailor access to areas on the computer specifically for each different position.
Jacob
You must be logged in to reply to this topic.