View Post

More on Limiting Damage to Information Assets

In Cybersecurity by Ian0 Comments

This entry is part 4 of 8 in the series Prevention and Protection Strategies

This entry is part 4 of 8 in the series Prevention and Protection StrategiesEstablishing and enforcing policies that limit employee access to sensitive data and IT systems are one of the most effective mitigation strategies against a malicious insider (Brancik, 2008).  There are a number of strategies that organizations can implement in order to better secure their digital assets. 

Share