A Business Guide To Information Security: How to Protect Your Company's IT Assets Reduce Risks and Understand the Law
The legal obligations placed upon businesses as part of governance requirements makes this essential reading for all businesses, large or small, simple or complex, on and off-line. This is a non-technical and up-to-date explanation of the vital issues facing all companies in an area increasingly noted for the high degrees of unofficial hype alongside government regulation and will be welcomed by those seeking to secure their businesses in the face of sustained threats to their assets and in particular, in relation to their data security. Full of practical and straightforward advice, key areas covered include handling the internet, e-commerce, wireless information systems and the legal and regulatory frameworks.
What people are saying - Write a review
We haven't found any reviews in the usual places.
1 Threats and compliance
2 Simply essential
3 The SOHO Internet Highway Code
4 The Infosec Basics for Business
5 Essentials for smaller organizations
6 Essentials for larger organizations
7 Essentials for wireless networking
Other editions - View all
acceptable use policy access controls adware anti-malware anti-virus software attack authentication automated backup Basics for Business bluesnarfing Bluetooth browser business continuity business continuity plan cellphones certificate Chapter 9 compliance comply configuration corporate credit card Data Protection Data Protection Act Data Security deploy device document e-commerce e-mail electronic employees encryption ensure firewall Governance guidance hackers Highway Code identified implementation individual information assets information security Information Security Management Infosec Basics installed Internet Highway Code issues laptop larger organizations malware Manager’s Guide ment Microsoft mobile phones monitoring operating system organization’s information organizational password PDAs perimeter phishing protocol public key regulations requirements responsible risk assessment rule server someone spam specific spyware standard teleworker theft threats tion updates user agreement user name usually virus viruses vulnerabilities WiFi Windows XP wireless networking WLAN