Security Controls: Best Practice Overview

By Jeremy Jethro of CipherTechs

Layer 8 is a term used by IT security consultants that represents the weakest link of most companies: users. While an organization may be secure and employ state-of-the-art security controls at the physical and technical levels, many executive teams management circumscribe operational security (also known as procedural security). To that end, let’s review the three important categories of security controls.

Comments

Popular posts from this blog

Jeremy Jethro Interview