Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
Smith went on to say that an organization is less likely to be victimized if it adopts security policies to protect systems and data, makes security policies known to all in the organization, makes methods for reporting suspicious incidents easy and confidential and plans its reaction to intrusions and losses. “Written plans should be approved by corporate legal, corporate security, management and the computer/network manager,” offered Smith. “Organizations should also involve employees in their plans’ development, since employees know organizational weaknesses and how to exploit them.”
0 Comments
View Comments
Maggie Dewitt
Author's page
Related Content
Comments