Security

Network Box Advisory: Forgotten Security

Download Now Free registration required

Executive Summary

Some businesses rely on IT departments to spot the weak points in the system and rectify them as soon as possible. Whilst the need for a rapid resolution is understandable, this method exposes the company to vulnerability - human error. A procedure should be in place, so that if and when a vulnerability is discovered, whoever makes the discovery knows exactly what needs to be done and when, and anybody needing to refer to what happened can find out who did what and when they did it. By implementing a change control procedure companies would automatically gain all the advantages.

  • Format: PDF
  • Size: 162.3 KB