One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 1570362
Date de publication 2020-02-11 13:36:19 (vue: 2020-02-29 05:00:23)
Titre NBlog Feb 8 - InfoSec 101
Texte For March, we're working on our final NoticeBored security awareness module, an update to "InfoSec 101". Unlike the other NoticeBored modules, this covers several information risk and security topics at a basic level. Its main purpose is to provide a gentle introduction, for example in new employee induction or orientation training, or as a launch module for organizations just starting or re-starting their awareness and training programs, bringing everybody quickly up to speed.So what should it cover? For the general staff audience, I'm thinking:Information risk and security fundamentals, including common terms Policies and procedures, with a touch of compliance User IDs and passwords ... and why they matter Backups Patching Phishing and other social engineering scams Apps and mobile security Ransomware and antivirus Physical security in the office Physical security when on the road or working from home Cloud, Internet, network and system security basics Vigilance: spotting, reacting to and reporting concerns Who's who - putting faces to the names behind information security For the management audience:Information risk and security management basics e.g. net value of incidents avoided/reduced less the costs of controlA little more on compliance e.g. privacy Roles, responsibilities and accountability, with a little on governance Strategies, architecture, plans and big-picture-stuff Insider/outsider threats includ
Envoyé Oui
Condensat 101 about access accountability activity alarms alerting all already another antivirus appropriate apps architecture are audience audience:identification audience:information authentication avoided/reduced awareness backups bank basic basics behind between big bore bound bringing business challenge charity cloud common company compliance concerns condescending content context: continuity controla controls conversely copyright costs cover covers cryptography culture customers cybersecurity deeper depends differ dipping easy emphasis employee engaging engineering essentials everybody everyone example executive faces feb figuring final find fraud from fundamentals general gentle governance help home how ids importantly improvement incidents including induction information infosec initial insider/outsider intellectual interesting internet introduction its just key know launch leastthat less level little logging lot main management march material matter messages metrics mobile module modules more most motivation much names navigate nblog need needs net network new not noticebored office once organizations orientation other out overwhelm part partners passwords patching people person phishing physical picture plans plus points policies privacy procedures professional programs property provide purpose putting quickly quite ransomware reacting receiving relationships relevant reporting responsibilities risk road roles say scams security several should since social speed spotting staff starting stiff strategies stuff suggests superficial system systematic team tech terms them things thinking thinking:information threats too topics touch touching training trivial unlike update use user value vendors vigilance: ways what when where which who why wish working would
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: