»Policies are not enough We could spend hours debating the best approach to securing the workplace, but policies are not enough to thwart an insider threat such as a WikiLeaks informant, says Hampton.»Enlist technical controls The technical controls - such as trusted security zones, well defined group policies, logging mechanisms - will prove to be the most effective way to protect the organization's data.
展开▼