Security Special Part 2: Internal, External & Disasters

 
 
Discover Worldwide Business Knowledge
 
gry arrow Internal Threats: Create an Acceptable Use Policy
gry arrow External Dangers: Discover the Latest Attack Methods
gry arrow Unexpected Disasters: Create a Solid Strategy
 
Welcome to issue 99 of your weekly Global Roundup email. This week is the final installment of our two-part security special. We have papers that cover the three main aspects of enterprise security - protection from internal and external threats as well as preparing for disasters. Keep checking our daily tech blog, which brings you IT insight from all over the world. 
 
Acceptable Use Policies: Protect your Business From the Inside
Every organization has some form of protection in place to prevent attacks from outsiders - but are you keeping an eye on the people who have access to your most valuable assets? Even if it is not malicious, abuse from insiders such as unacceptable internet use can leave your company at risk. This paper identifies some of the complexities involved in creating and managing an acceptable use policy (AUP) and demonstrates that an acceptable AUP is more than a simple list of dos and don'ts. 
 
Download the white paper
 
June 2011 Report: Prepare for the Latest Web Threats
Threats to your organization are constantly evolving, with cybercriminals often learning to evade new security measures as quickly as they are put in place. Therefore, it is essential to keep up-to-date with the latest threats and security practices. This 2011 mid-year security report, published last month, outlines the latest web threats that could affect your organization. Read now to get to know your enemy and learn how to keep it out. 
 
Download the white paper
 
Disaster Recovery Plan: Don't Miss These Essential Factors
As well as the dangers posed to your business through intentional attack, natural disasters and technical failures can strike at any time. Many organizations think they have a solid disaster recovery plan, but there are several factors that are often missed out when building such a strategy. This paper reveals the ten most commonly forgotten things that occur when building a disaster recovery plan. Read now and learn how to avoid these mistakes in your strategy. 
 
Download the white paper
 

Kind regards

Kasey Cassells
e-Editor
IDG Connect

P.S: You can
discuss al the IT issues that matter to you on the Global Roundup on LinkedIn.

gry arrow Forward this mailer to a Friend/Colleague
Find us on: Facebook Facebook Twitter Twitter LinkedIn LinkedIn RSS Feed RSS Feed
Subscribe to topical weekly email Roundups from IDG Connect.
If you do not wish to receive any further emails click here
Contact us if you need any assistance or additional information.
 
IDG Connect
IDG Connect's Privacy Policy Copyright © 2010. All rights reserved.
IDG Connect, Staines One, Station Approach, Staines Middlesex, TW18 4LY, UK.
www.idgconnect.com

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS
Read Comments

0 comments:

Post a Comment