Security Controls: Best Practice Overview
By Jeremy Jethro of CipherTechs
Layer 8 is a term used by IT security consultants that represents the weakest link of most companies: users. While an organization may be secure and employ state-of-the-art security controls at the physical and technical levels, many executive teams management circumscribe operational security (also known as procedural security). To that end, let’s review the three important categories of security controls.
Layer 8 is a term used by IT security consultants that represents the weakest link of most companies: users. While an organization may be secure and employ state-of-the-art security controls at the physical and technical levels, many executive teams management circumscribe operational security (also known as procedural security). To that end, let’s review the three important categories of security controls.
Comments
Post a Comment