Designing Security Practices for Data and Network Protection
Source: Dynamic Computer
Fifteen years ago, many IT shops and organizations were huddled in conference rooms determining their policies and best practices for data security. Documents were made, unofficial standards were set, and IT administrators took up a defensive stance at the perimeter of their networks. Since then, many new threat vectors have developed, as have many new data protection standards and initiatives. This paper summarizes Dynamic's current stance on data protection, network security, and the need for routine security assessments.