View Post

More on Limiting Damage to Information Assets

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 4 of 8 in the series Prevention and Protection Strategies

Establishing and enforcing policies that limit employee access to sensitive data and IT systems are one of the most effective mitigation strategies against a malicious insider (Brancik, 2008).  There are a number of strategies that organizations can implement in order to better secure their digital assets.