Organizations have for some time used conditions of employment as an end user control in their GRC (Governance, Risk and Compliance) process to address Cyber and Data Security. For many, this is a ‘get out of jail free’ card for disowning the actions of users who may click on the wrong email, inadvertently send documents […]
November 16, 2015
Continuous User monitoring is a reality and an almost essential component of any organizations IT Security toolbox. To preserve employee privacy and the avoidance of challenges from individuals that corporates have compromised their integrity, it requires double blind protections. Obvious yes, but apparently not as many solutions do not flfill this crucial function. With the […]
November 6, 2015
Further on the IoT (Internet of Things) theme I first wrote about back in June – ‘Internet of Things’ (IoT), Convenience or Calamity?’ ‘FBI Issues Alert on the Security of Internet of Things (IoT) Devices’. Welcomed news until you move past the headline. The guidance that unfolds recommends that responsibility for security should rest with […]
November 27, 2015
0