Security Awareness - Implementing an Effective Strategy

People are often referred to as the weakest link in an information security program. Through either intentional or accidental misuse of access, people often leave networks and organizations exposed. 'All it takes is just one weak link in the chain for an attacker to gain a foothold into your...
By
Chelsa Russell
October 25, 2002

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg