Monday, March 30, 2015

Data Security – An Overview for Executive Board members [Part 3:Network Security]

Introduction In Part 2 of this series we reviewed Access Control – the beginning of a good Data Security policy. In this section we’ll move on to Network Security Controls: once a user has access to a device or data, almost all interactions today are with a network of devices, servers, storage, transmission paths, web […]