Skip to content Skip to sidebar Skip to footer

Don’t WannaCry? Cyber Security Starts With Sound Information Security Policies

We all know we need to update our software, backup our critical data, install and maintain antimalware software and firewalls, manage robust contingency and recovery plans, not open funky emails, audit everything, blah blah blah. So what's wrong with us? Why don't we all do these things consistently? I'd like to think that everything we have been lectured, reminded, scolded, chastised, and even ridiculed about in the way of protecting our digital assets is doable and reasonable, but face it – sometimes it's not. Costs, number of hours in the day, distractions, urgent priorities, sleep, other crises, get in the way. Or, to put it simply, we get lazy or "have better things to do."

Read More

information-security-policies-made-easy-rothstein-publishing

Information Security Policies Made Easy

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering 200+ security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with 10,000+ customers in 60 countries. Take the work out of creating, writing, and implementing security policies. Information Security Policies Made Easy has everything you need to build a robust security policy program, delivered by electronic download.

Read More

Information Security Policies Made Easy

Information Security Policies Made Easy

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies. Information Security Policies Made Easy has everything you need to build a robust security policy program.

Read More

E-mail
Password
Confirm Password