Computer Security: 20 Things Every Employee Should Know
Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you'll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include: Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; E-mail; Web surfing and Internet use; Instant messaging; Personal firewalls and patches; Hand-held devices; Data backup; Management of sensitive information; Social engineering tactics; and, Use of corporate resources. Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experience in the area of information systems security and privacy.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Keep your password secure
Practice safe data transfer
Surf the Web wisely at work
3 other sections not shown
24 Lessons Alice anti-virus software appropriately aware backup Baltimore Technologies book copies call the CIRT CISSP clean desk policy company information company resources company's computer security confidential information containing confidential data Cookies corporate confidential corporate data corporate information corporate security Data classification data security deal with e-mail Degaussing deleted device e-mail attachments e-mail hoax E-mail spoofing effective electronic encrypted ensure forwarding hackers hard drive inappropriate infect your computer information security Information Systems Security instant messaging internal network Internet keep laptop legitimate business need malware modem monitor organization passphrase PDAs personal digital assistant Post-it prevent protect remote access rity secu security incidents security policy security risks security strategy sensitive information server share your passwords social engineering someone spoofing stored sure surfing Systems Security Professional theft Things Every Employee ThruPoint tion unauthorized Vince Lombardi virus viruses vulnerabilities wireless zip drive