As a result of the adjustments in the way business is conducted, ownership of information does not
carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around
information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally
supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information
Organisations of all sizes are becoming victims to cybercriminals, data breaches, information theft and security risks. But before you go out and spend a fortune on security software, solutions and consultants, the starting point is to identify and measure your business’s exposure to those risks. In this whitepaper, “Exploring, Identifying and Measuring” risk, we examine how to identify risk and share an approach for identifying and measuring risk in your organisation.
This paper describes how a cloud Services User achieves the true benefits of cloud services and sends warning messages to the providers, hosting companies and telecommunications firms. It also provides clues on how a customer can gain better value from services offered by the new cloud companies and Hosting businesses.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.